nccgroup / SSHessionLinks
The SSH Multiplex Backdoor Tool
☆64Updated 5 years ago
Alternatives and similar repositories for SSHession
Users that are interested in SSHession are comparing it to the libraries listed below
Sorting:
- Scan for and exploit Consul agents☆40Updated 5 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- ☆30Updated 6 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 8 months ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- In motherland, target network calls you!☆60Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- ☆33Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆56Updated 5 years ago
- ☆25Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆74Updated 7 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A proof of concept for delivering webbugs via AWS lambda☆45Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Automated enumeration☆30Updated 4 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago