Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail)
☆25Jul 19, 2024Updated last year
Alternatives and similar repositories for gmail-ssh-log-alert
Users that are interested in gmail-ssh-log-alert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆18Jul 19, 2024Updated last year
- OWASP based Web Application Security Testing Checklist☆85Jul 19, 2024Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Jul 19, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- ☆48Jul 19, 2024Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆225Jul 19, 2024Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆139Jul 19, 2024Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆407Jan 19, 2025Updated last year
- Autohack is a scripting framework to help save you time. Whether you're in a hurry or have a lot of time on your hands, learning and reme…☆17Apr 8, 2025Updated last year
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- GitHub landing page repo☆12Feb 18, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13Jul 8, 2020Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- Multi-threaded port scanner written in C++☆14Dec 17, 2019Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 5 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-pa…☆18Oct 10, 2025Updated 6 months ago
- ☆17Jun 14, 2023Updated 2 years ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- Transform your batch (bat) script into one binary.exe☆52Feb 11, 2024Updated 2 years ago
- Python script to create a Rat stealing tokens, etc.☆11Aug 10, 2022Updated 3 years ago
- Generates millions of keyword-based password mutations in seconds.☆1,437Jun 8, 2025Updated 10 months ago
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago