hc0d3r / tea
ssh-client worm
☆154Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for tea
- A tool to generate obfuscated one liners to aid in penetration testing☆176Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆247Updated last year
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 3 years ago
- Extensible Red Team Framework☆111Updated 4 years ago
- Common password pattern generator using strings list☆129Updated 3 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆125Updated 6 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- mosquito - Automating reconnaissance and brute force attacks☆128Updated 4 years ago
- For all your network pentesting needs☆150Updated 5 months ago
- My collection of metasploit auxiliary post-modules☆189Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆373Updated 3 years ago
- APT34/OILRIG leak☆231Updated 5 years ago
- an asynchronous target enumeration tool☆239Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 5 months ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆287Updated 6 years ago