magisterquis / sshpocwormLinks
Proof-Of-Concept SSH Worm. Not for illegal use.
☆14Updated 7 years ago
Alternatives and similar repositories for sshpocworm
Users that are interested in sshpocworm are comparing it to the libraries listed below
Sorting:
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- pentest toolbox☆28Updated 2 years ago
- A tool for recover router password☆30Updated 6 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- ☆19Updated 7 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 5 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago