Debian OpenSSL Predictable PRNG (CVE-2008-0166)
☆410Jan 22, 2023Updated 3 years ago
Alternatives and similar repositories for debian-ssh
Users that are interested in debian-ssh are comparing it to the libraries listed below
Sorting:
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,504Aug 1, 2023Updated 2 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆850Feb 13, 2025Updated last year
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,497Dec 19, 2023Updated 2 years ago
- ☆1,489Dec 31, 2022Updated 3 years ago
- Scripts created to help with post exploitation of a Windows host☆99Feb 1, 2021Updated 5 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,992Oct 10, 2018Updated 7 years ago
- JAWS - Just Another Windows (Enum) Script☆1,919Apr 19, 2021Updated 4 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- MS17-010☆2,231Jun 20, 2023Updated 2 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Dec 27, 2022Updated 3 years ago
- Enyx SNMP IPv6 Enumeration Tool☆106Jan 20, 2023Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,173May 11, 2023Updated 2 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,732Dec 18, 2021Updated 4 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,658Nov 28, 2020Updated 5 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,184Dec 11, 2022Updated 3 years ago
- Python PTY backdoors - full PTY or nothing!☆754Jul 28, 2014Updated 11 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆627Jun 8, 2018Updated 7 years ago
- Changes for Visual Studio 2013☆119Jun 22, 2015Updated 10 years ago
- ☆1,190Apr 23, 2017Updated 8 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,913Nov 19, 2025Updated 3 months ago
- Monitor linux processes without root permissions☆5,891Jan 17, 2023Updated 3 years ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891May 16, 2020Updated 5 years ago
- Corelan Repository for mona.py☆1,850Oct 31, 2025Updated 4 months ago
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆593Jan 8, 2021Updated 5 years ago
- Micro$oft Windows Hacking Pack☆525Mar 6, 2018Updated 7 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,917Sep 7, 2020Updated 5 years ago
- PowerTools is a collection of PowerShell projects with a focus on offensive operations.☆2,180Dec 28, 2021Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆968Dec 29, 2017Updated 8 years ago
- Various code snippets☆280Feb 8, 2026Updated 3 weeks ago
- C implementation of the file-less UAC exploit☆74Sep 1, 2016Updated 9 years ago
- Automated script for performing Padding Oracle attacks☆807Jul 13, 2024Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,260Feb 20, 2026Updated last week
- MSFvenom Payload Creator (MSFPC)☆1,312May 9, 2021Updated 4 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆691Dec 29, 2017Updated 8 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,493Updated this week
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆949Apr 20, 2022Updated 3 years ago