nccgroup / SSHession
The SSH Multiplex Backdoor Tool
☆63Updated 5 years ago
Alternatives and similar repositories for SSHession:
Users that are interested in SSHession are comparing it to the libraries listed below
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- ☆25Updated 3 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 5 months ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆66Updated 2 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Enumerate S3 buckets via certstream, domain, or keywords☆15Updated 7 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆73Updated 6 years ago
- Enumerate RIDs using pure Python☆31Updated 7 months ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago