just for fun ¯\_(ツ)_/¯
☆278Sep 21, 2016Updated 9 years ago
Alternatives and similar repositories for openssh-backdoor-kit
Users that are interested in openssh-backdoor-kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- offsec batteries included☆1,606Mar 11, 2024Updated 2 years ago
- your offsec knowledge☆485Oct 9, 2019Updated 6 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 9 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,457Nov 3, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 3 years ago
- Stealing passwords every time they change☆66Mar 19, 2020Updated 6 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆976Dec 11, 2020Updated 5 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆134Jul 24, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Some useful scripts for CobaltStrike☆858Dec 17, 2020Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 2 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆887Sep 9, 2022Updated 3 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Mar 25, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆819Apr 7, 2024Updated last year
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆844Jun 25, 2024Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago