magisterquis / sshpocworm
Proof-Of-Concept SSH Worm. Not for illegal use.
☆14Updated 6 years ago
Alternatives and similar repositories for sshpocworm:
Users that are interested in sshpocworm are comparing it to the libraries listed below
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 8 months ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- Various exploits☆10Updated 7 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- pentest toolbox☆28Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 2 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆16Updated 6 years ago
- The LAZY script will make your life easier, and of course faster.☆9Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A tool for recover router password☆29Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago