magisterquis / sshbfView external linksLinks
Simple SSH brute-forcer written in Go
☆23May 29, 2016Updated 9 years ago
Alternatives and similar repositories for sshbf
Users that are interested in sshbf are comparing it to the libraries listed below
Sorting:
- ☆18Sep 22, 2018Updated 7 years ago
- Create a DDOS attack using SNMP servers☆44Mar 1, 2014Updated 11 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Mar 5, 2014Updated 11 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated last year
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 4 years ago
- ☆11Aug 18, 2021Updated 4 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Using nfqueue to accept or drop flows destined for SNI domainnames☆21Feb 24, 2025Updated 11 months ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 9 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- python3-wappalyzer☆13Oct 8, 2019Updated 6 years ago
- An implementation of jpnevulator in Python☆21Jan 30, 2018Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- one more spider based on gevent requests pyquery☆53Sep 14, 2014Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- nmap service and application version detection (without nmap installation)☆115Dec 12, 2017Updated 8 years ago
- Modified socks.py which supports chained proxies☆57Apr 23, 2025Updated 9 months ago
- High-interaction MitM SSH honeypot☆172May 13, 2018Updated 7 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- List of Services (File Sharing, URL shorteners...)☆19Oct 4, 2020Updated 5 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- Transparently tunnel your IP traffic through ICMP echo and reply packets☆19Feb 11, 2016Updated 10 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago