epsylon / fuzzssh
FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.
☆15Updated 2 years ago
Related projects: ⓘ
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 10 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆15Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- ☆41Updated this week
- ☆27Updated this week
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 3 years ago
- ☆36Updated this week
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆32Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated last year
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Shell hunter for AF☆34Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Payloads and Lists☆19Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 5 months ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- ☆10Updated this week
- A collection of beautified and commented samples of malware implemented in Bash☆9Updated last year
- Bash script to generate reverse shell payloads☆20Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Free Advance encryptor for Anon Cloud☆17Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆52Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- ☆21Updated this week
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆22Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆27Updated last month
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆15Updated this week