hc0d3r / sshd-poison
sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.
☆94Updated 4 years ago
Alternatives and similar repositories for sshd-poison:
Users that are interested in sshd-poison are comparing it to the libraries listed below
- try privilege escalation changing sudo command☆118Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆57Updated 4 years ago
- KeyLogger for Linux Systems☆70Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Using IPv6 to Bypass Security☆94Updated last year
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated last month
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Burp Commander written in Go☆57Updated 5 years ago
- How To Execute Shellcode via HTA☆136Updated 6 years ago
- rce exploit , made to work with pocsuite3☆120Updated 5 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- Linux Privilege Escalation Tool☆181Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆76Updated 7 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Used for the osce exam preparation☆74Updated 8 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Tool to communicate with RPC services and check misconfigurations on NFS shares☆61Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated last year
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago