jivoi / openssh-backdoor-kitView external linksLinks
just for fun ¯\_(ツ)_/¯
☆277Sep 21, 2016Updated 9 years ago
Alternatives and similar repositories for openssh-backdoor-kit
Users that are interested in openssh-backdoor-kit are comparing it to the libraries listed below
Sorting:
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆91Jun 19, 2015Updated 10 years ago
- offsec batteries included☆1,593Mar 11, 2024Updated last year
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- your offsec knowledge☆481Oct 9, 2019Updated 6 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆728Nov 19, 2017Updated 8 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- Vulnerability Labs for security analysis☆1,172Mar 10, 2021Updated 4 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Stealing passwords every time they change☆66Mar 19, 2020Updated 5 years ago
- Some useful scripts for CobaltStrike☆858Dec 17, 2020Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆134Jul 24, 2018Updated 7 years ago
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆17Aug 2, 2021Updated 4 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Sep 19, 2017Updated 8 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆883Sep 9, 2022Updated 3 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- 💸 A smart contract that facilitates the payout of funds (via dividend) to investors.☆11Dec 12, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆529Oct 11, 2020Updated 5 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Mar 25, 2019Updated 6 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Script to steal passwords from ssh.☆488Dec 19, 2018Updated 7 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Apr 7, 2024Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- Auto Root Exploit Tool☆534Jun 15, 2023Updated 2 years ago
- ☆54Aug 13, 2018Updated 7 years ago