Master password for openSSH service
☆16May 30, 2019Updated 6 years ago
Alternatives and similar repositories for sshmp
Users that are interested in sshmp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 12 years ago
- Twitter High level scraper for humans.☆63Mar 10, 2020Updated 6 years ago
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 2 months ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A simple bash script that uses smbclient to test access to Windows file shares in automated fashion.☆18Jul 9, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- nmap nse script for web services screenshot☆16Jul 22, 2013Updated 12 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- A vulnerable Play application for attackers.☆18Apr 28, 2026Updated last week
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- whois.cynthia.re V2☆14May 23, 2021Updated 4 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Run a task on AWS ECS and stream output☆14Jul 26, 2024Updated last year
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Terraform module for AWS WAF implementation.☆15May 17, 2022Updated 3 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Websploit is a high level MITM framework☆1,233May 14, 2023Updated 2 years ago
- ☆14May 23, 2018Updated 7 years ago
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An automated tool for creating ProtonVPN accounts 🌐☆21Dec 11, 2022Updated 3 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 11 years ago
- Android penetration testing tool for Kali linux☆16Jul 16, 2018Updated 7 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago