magisterquis / sshpocwormLinks
Proof-Of-Concept SSH Worm. Not for illegal use.
☆14Updated 7 years ago
Alternatives and similar repositories for sshpocworm
Users that are interested in sshpocworm are comparing it to the libraries listed below
Sorting:
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- A tool for recover router password☆30Updated 7 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 9 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆34Updated last month
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 6 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- Tools for hunting security threats☆12Updated 5 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 9 years ago
- ☆70Updated 6 years ago
- Python driver for Wappalyzer, a web application detection utility.☆11Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆54Updated 4 months ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 2 months ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- masscan result parsing, web server fingerprinting☆19Updated 3 years ago