hc0d3r / sshd-poison
sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.
☆94Updated 4 years ago
Alternatives and similar repositories for sshd-poison:
Users that are interested in sshd-poison are comparing it to the libraries listed below
- try privilege escalation changing sudo command☆119Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Upgrade your netcat shell today!☆60Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆65Updated last month
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆69Updated 5 years ago
- Using IPv6 to Bypass Security☆93Updated last year
- Deploy payloads to *Nix systems en masse☆108Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆228Updated 2 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- How To Execute Shellcode via HTA☆137Updated 7 years ago
- Exploits and advisories☆189Updated 4 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆122Updated 5 years ago
- ☆31Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆56Updated 5 years ago