parsiya / SSH-Scanner
Simple SSH vulnerability scanner based on SSH Harvester
☆13Updated 7 years ago
Alternatives and similar repositories for SSH-Scanner:
Users that are interested in SSH-Scanner are comparing it to the libraries listed below
- React UI☆11Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 3 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- Simple golang reverse shell☆20Updated 5 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- ☆14Updated 7 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Updated 4 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Python implementation of RSA reverse shell.☆11Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Simulates a logged in user.☆16Updated 7 months ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- ☆16Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- Working exploit code for CVE-2019-17625☆17Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago