parsiya / SSH-Scanner
Simple SSH vulnerability scanner based on SSH Harvester
☆13Updated 7 years ago
Alternatives and similar repositories for SSH-Scanner:
Users that are interested in SSH-Scanner are comparing it to the libraries listed below
- React UI☆11Updated 2 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- Python implementation of RSA reverse shell.☆11Updated 8 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Updated 10 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- ☆14Updated 7 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Updated 7 years ago
- Simulates a logged in user.☆16Updated 9 months ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- "HeaderScan" Burp Plugin☆16Updated 10 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆19Updated 3 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- Is this IP a C2 server?☆28Updated 4 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Simple SSH brute-forcer written in Go☆21Updated 8 years ago