Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail)
☆25Jul 19, 2024Updated last year
Alternatives and similar repositories for gmail-ssh-log-alert
Users that are interested in gmail-ssh-log-alert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆18Jul 19, 2024Updated last year
- OWASP based Web Application Security Testing Checklist☆84Jul 19, 2024Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- ☆26Jun 24, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A compact guide to network pivoting for penetration testings / CTF challenges.☆225Jul 19, 2024Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Jul 19, 2024Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆138Jul 19, 2024Updated last year
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 8 months ago
- Autohack is a scripting framework to help save you time. Whether you're in a hurry or have a lot of time on your hands, learning and reme…☆17Apr 8, 2025Updated last year
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- GitHub landing page repo☆12Feb 18, 2026Updated last month
- ☆13Jul 8, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 9 months ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 4, 2026Updated last week
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- A Simple Script For SSH BruteForce☆39Aug 4, 2023Updated 2 years ago
- Python script to create a Rat stealing tokens, etc.☆11Aug 10, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Mar 24, 2023Updated 3 years ago