thisisnzed / SSHScanner
This tool scans random SSH servers around the world and it tests the most used passwords
☆14Updated 2 years ago
Alternatives and similar repositories for SSHScanner:
Users that are interested in SSHScanner are comparing it to the libraries listed below
- Layer 7 UAM Bypass☆9Updated 5 years ago
- Qbot Source, Scanners, loaders....☆11Updated last year
- An advanced malware framework.☆10Updated 3 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated last month
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- web based c2 🏴☠️☆13Updated 8 months ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Extend wordlist by appending digits and special characters to each word.☆10Updated 2 years ago
- ☆12Updated 3 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆26Updated 2 years ago
- A semi-automatic osint/recon framework.☆24Updated 11 months ago
- AES Ransomware in batch☆11Updated 10 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Single-Clich-Proxy-Chains☆9Updated 4 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 5 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- It's go boom, a simple webserver DDoS tool using differents proxy for each threads☆12Updated last year