Proof-Of-Concept SSH Worm. Not for illegal use.
☆14Mar 21, 2018Updated 7 years ago
Alternatives and similar repositories for sshpocworm
Users that are interested in sshpocworm are comparing it to the libraries listed below
Sorting:
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 4 years ago
- ☆31Feb 27, 2026Updated last week
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Jul 28, 2021Updated 4 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- IoT device scanner.☆41Aug 19, 2019Updated 6 years ago
- This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiat…☆39Jul 24, 2014Updated 11 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- ☆12Feb 4, 2025Updated last year
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- ☆39Dec 4, 2023Updated 2 years ago
- MinIO nodes for n8n☆11Updated this week
- Hacking tools. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more.☆41Sep 7, 2021Updated 4 years ago
- webusb ch340 terminal work on android brauser☆14Dec 12, 2025Updated 2 months ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- This is a framework used to weaponize any USB Drive☆46Sep 29, 2022Updated 3 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- The frontend app of Mailcow's CowUI web interface☆12Apr 29, 2024Updated last year
- ☆11Dec 5, 2022Updated 3 years ago
- An ERC721 implementation of event tickets.☆10Jan 15, 2022Updated 4 years ago
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- Integrate Claude Code capabilities into OpenClaw (formerly Clawdbot) using MCP. More info: https://openclaw.ai/☆23Feb 14, 2026Updated 3 weeks ago
- ☆12Sep 15, 2025Updated 5 months ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- Various Vector Similarity Search examples☆13Dec 30, 2022Updated 3 years ago
- Pulsar Heavy Industries main source code repository☆11Dec 20, 2018Updated 7 years ago
- ☆11Apr 7, 2023Updated 2 years ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- An application to move data around☆15Apr 24, 2023Updated 2 years ago
- http CONNECT tunnel☆10Mar 26, 2020Updated 5 years ago
- A powerful AI chat application that enables human-like conversation with fully animated AI characters.☆13Dec 7, 2024Updated last year
- ⚡ Developer-friendly hybrid-RAG toolkit merging Graphiti, Qdrant, mem0, LlamaIndex, and LangChain into one powerful engine.☆15Jan 14, 2026Updated last month