hc0d3r / sshd-poison
sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.
☆94Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for sshd-poison
- try privilege escalation changing sudo command☆118Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆76Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆56Updated 4 years ago
- Deploy payloads to *Nix systems en masse☆105Updated 4 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- Upgrade your netcat shell today!☆59Updated 7 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- ☆71Updated 5 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- This is a kernel module invoked reverse shell proof of concept.☆71Updated 5 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆52Updated 5 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- Custom tools and projects about security☆111Updated 3 years ago
- Using IPv6 to Bypass Security☆93Updated last year
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆67Updated 4 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago