polymorf / ssh-relay
SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...
☆23Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for ssh-relay
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- ☆15Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 8 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- See here:☆41Updated 11 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago