just for fun ¯\_(ツ)_/¯
☆281Sep 21, 2016Updated 9 years ago
Alternatives and similar repositories for openssh-backdoor-kit
Users that are interested in openssh-backdoor-kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use Tor for anonymous scanning with nmap☆95Jun 19, 2015Updated 10 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- offsec batteries included☆1,609Mar 11, 2024Updated 2 years ago
- your offsec knowledge☆486Oct 9, 2019Updated 6 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 9 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Vulnerability Labs for security analysis☆1,171Mar 10, 2021Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,460Nov 3, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆774Mar 29, 2023Updated 3 years ago
- Stealing passwords every time they change☆66Mar 19, 2020Updated 6 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆978Dec 11, 2020Updated 5 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆134Jul 24, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Some useful scripts for CobaltStrike☆856Dec 17, 2020Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 3 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆887Sep 9, 2022Updated 3 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Mar 25, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆818Apr 7, 2024Updated 2 years ago
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆846Jun 25, 2024Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago