hc0d3r / sshd-poison
sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.
☆94Updated 4 years ago
Alternatives and similar repositories for sshd-poison:
Users that are interested in sshd-poison are comparing it to the libraries listed below
- try privilege escalation changing sudo command☆119Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Upgrade your netcat shell today!☆60Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆101Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Using IPv6 to Bypass Security☆94Updated last year
- Exploits and advisories☆189Updated 4 years ago
- Ye olde root shell for ye olde httpd☆44Updated 9 years ago
- Python api for usage with cobalt strike's External C2 specification☆227Updated last year
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆62Updated 3 weeks ago
- Python api for usage with cobalt strike's External C2 specification☆68Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆67Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- ☆59Updated 4 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- ☆92Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆44Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆121Updated 5 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 4 years ago