magisterquis / sshpocwormLinks
Proof-Of-Concept SSH Worm. Not for illegal use.
☆14Updated 7 years ago
Alternatives and similar repositories for sshpocworm
Users that are interested in sshpocworm are comparing it to the libraries listed below
Sorting:
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- pentest toolbox☆28Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 8 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated last year
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 6 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Repository of tools used in my blog☆51Updated last year
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- A tool for recover router password☆30Updated 7 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆46Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago