Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailgun)
☆27Jul 19, 2024Updated last year
Alternatives and similar repositories for ssh-log-alert
Users that are interested in ssh-log-alert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆18Jul 19, 2024Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- OWASP based Web Application Security Testing Checklist☆84Jul 19, 2024Updated last year
- ☆26Jun 24, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆48Jul 19, 2024Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Jul 19, 2024Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆225Jul 19, 2024Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆407Jan 19, 2025Updated last year
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 8 months ago
- Autohack is a scripting framework to help save you time. Whether you're in a hurry or have a lot of time on your hands, learning and reme…☆17Apr 8, 2025Updated last year
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Feb 12, 2026Updated 2 months ago
- GitHub landing page repo☆12Feb 18, 2026Updated last month
- ☆13Jul 8, 2020Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 9 months ago
- Use https://chea.to (Cheato Spoofer) HWID spoofer as it is the most undetected and best HWID spoofer out there! Full dump of Lean Woofer …☆14Sep 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cheats, with external menu. Using nullbase & imgui☆14Aug 30, 2022Updated 3 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 4 years ago
- A deobfuscator for multiple python obfuscators☆23Jan 22, 2022Updated 4 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 4, 2026Updated last week
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- ☆12Oct 12, 2022Updated 3 years ago
- A library to decode EazFuscator's encrypted symbol names, if you have the password.☆44Aug 15, 2019Updated 6 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- Burp Suite extension to easily export sub domains☆12Dec 2, 2019Updated 6 years ago