hc0d3r / sshd-poison
sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.
☆94Updated 4 years ago
Alternatives and similar repositories for sshd-poison:
Users that are interested in sshd-poison are comparing it to the libraries listed below
- try privilege escalation changing sudo command☆119Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Upgrade your netcat shell today!☆60Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆69Updated 5 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- Using IPv6 to Bypass Security☆93Updated last year
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆65Updated last month
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 3 months ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 9 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 5 years ago
- Custom tools and projects about security☆110Updated 3 years ago
- How To Execute Shellcode via HTA☆137Updated 7 years ago
- MS17-010☆63Updated 7 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆79Updated 7 years ago
- Brute forcer and shell deployer for WildFly☆100Updated 7 years ago
- ☆92Updated 6 years ago
- Metasploit automation. Why work when a minion can do it?☆21Updated 7 years ago
- Exploits and advisories☆189Updated 4 years ago