This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are planning on doing a time based exam like OSCP), this should be useful for anyone who has a need to login to servers using a Secure SHell.
☆15Feb 9, 2019Updated 7 years ago
Alternatives and similar repositories for effective-ssh-usage-for-pentesters
Users that are interested in effective-ssh-usage-for-pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- My blog articles☆25May 22, 2015Updated 10 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Apr 26, 2025Updated 10 months ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Python library for the SI1145.☆20Jan 22, 2019Updated 7 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- Linux kernel modules for webOS☆13May 26, 2025Updated 9 months ago
- bash code to calculate the standard passwords from your ISP router☆38Jan 2, 2020Updated 6 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- An OpenWrt luci app that adds a Cellular Status page for wireless modems with QMI drivers☆14May 16, 2023Updated 2 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Weewx Responsive Skin using the Bootstrap framework☆23Mar 8, 2026Updated 2 weeks ago
- Tesla alert codes and their definitions.☆19Oct 24, 2024Updated last year
- A curated list of daily learnings, writeups, blogs, tips and everything related to hacking☆12Feb 5, 2023Updated 3 years ago
- Bash script that helps you set up a WireGuard VPN with your preferred web panel.☆13Sep 25, 2023Updated 2 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- MyTomato environment for Shibby or FreshTomato ARM v7 firmwares☆16Sep 22, 2024Updated last year
- a simple php script that makes use of Dump1090-mutability aircraft.json and filters/writes to MySQL☆31Jan 25, 2022Updated 4 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆13Aug 26, 2021Updated 4 years ago
- A simple fake NTP server☆14Feb 28, 2016Updated 10 years ago
- Yet another set of CISSP mnemonics☆22Mar 10, 2026Updated 2 weeks ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- ☆11Jun 28, 2023Updated 2 years ago
- download higher resolution photo from vk.com☆10Aug 30, 2021Updated 4 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A tool for participants of Blitzortung.org to display lightning data on their web sites. NOTE: No active support by me! Please use our fo…☆44Aug 28, 2020Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- A tool to decrypt Tesla OTA firmwares☆21May 29, 2023Updated 2 years ago