jm33-m0 / SSH-HarvesterLinks
Harvest passwords automatically from OpenSSH server
☆375Updated 2 years ago
Alternatives and similar repositories for SSH-Harvester
Users that are interested in SSH-Harvester are comparing it to the libraries listed below
Sorting:
- ↕️🤫 Stealth redirector for your red team operation security☆715Updated 3 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆434Updated 2 years ago
- ☆232Updated 10 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆527Updated 5 months ago
- MultiPlatform HTTP Reverse Shell☆238Updated last year
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆444Updated 2 years ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆442Updated last year
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆392Updated 2 years ago
- CVE-2023-24055 PoC (KeePass 2.5x)☆254Updated 2 years ago
- POC for CVE-2022-39952☆267Updated 2 years ago
- SSH Zero-Day Made By ClumsyLulz☆124Updated 7 months ago
- Escalate Service Account To LocalSystem via Kerberos☆398Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆169Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆125Updated 2 years ago
- A Linux persistence tool!☆157Updated 3 weeks ago
- exploit for f5-big-ip RCE cve-2023-46747☆207Updated 11 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆547Updated last year
- reverse shell using curl☆461Updated last year
- ☆351Updated 2 years ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆313Updated 5 months ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆265Updated 2 years ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆253Updated last month
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆354Updated 2 years ago
- pdf exploit 集成☆238Updated last year
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆265Updated 2 weeks ago
- ☆165Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆414Updated 9 months ago
- ☆564Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆277Updated 7 months ago