epsylon / fuzzssh
FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.
☆16Updated 3 years ago
Alternatives and similar repositories for fuzzssh:
Users that are interested in fuzzssh are comparing it to the libraries listed below
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated 11 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆39Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆13Updated last week
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆33Updated 3 weeks ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 2 weeks ago
- List of fresh and validated DNS resolvers updated every 12h.☆22Updated this week
- Another vulnerability scanner☆19Updated 3 weeks ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 7 months ago
- ☆26Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast☆6Updated this week
- ☆27Updated last year
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Updated 2 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago