Master password for openSSH service
☆16May 30, 2019Updated 6 years ago
Alternatives and similar repositories for sshmp
Users that are interested in sshmp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 11 years ago
- Twitter High level scraper for humans.☆63Mar 10, 2020Updated 6 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 3 weeks ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 2 weeks ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Detect data containing Personally Identifiable Information (PII) in R☆15Jul 1, 2017Updated 8 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- HTTP/HTTPS based Golang botnet☆19Oct 1, 2021Updated 4 years ago
- Terraform module for AWS WAF implementation.☆15May 17, 2022Updated 3 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Websploit is a high level MITM framework☆1,233May 14, 2023Updated 2 years ago
- ☆14May 23, 2018Updated 7 years ago
- Fastest Diffusion backend, WebUI, server. Pushing implementation and discovery of optimizations techniques 🚀☆48Feb 14, 2026Updated last month
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 10 years ago
- Android penetration testing tool for Kali linux☆16Jul 16, 2018Updated 7 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Random Tools☆19Jan 23, 2019Updated 7 years ago
- iOS app that displays a web site full-screen using a WebKit view. Please do the world a favor and don't use this unless the web site that…☆25Jan 22, 2012Updated 14 years ago
- GitHub Advanced Security C# Demo Application☆17Aug 8, 2024Updated last year
- flask-webgoat is a deliberately-vulnerable application written with the Flask web framework.☆19Sep 5, 2025Updated 6 months ago
- R code to scan for obvious PII.☆15Feb 4, 2022Updated 4 years ago
- This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).☆21Updated this week
- PHP SMS Sender Only Script And API☆27Jan 6, 2018Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago