The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator passwords for environments where it is not possible or not appropriate to disable these local accounts. Clients may be configured to rotate passwords automatically. Stored passwords can be retrieved by desktop support …
☆130Jan 28, 2018Updated 8 years ago
Alternatives and similar repositories for SHIPS
Users that are interested in SHIPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 10 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆338Sep 30, 2020Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆527Apr 13, 2017Updated 9 years ago
- ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.☆79Sep 15, 2016Updated 9 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆372Jul 30, 2024Updated last year
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆501Nov 17, 2022Updated 3 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆307Jul 28, 2024Updated last year
- Metasploit Framework☆30Dec 11, 2013Updated 12 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆49Nov 11, 2015Updated 10 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,043Jan 6, 2022Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- AV/EDR evasion via direct system calls.☆33Dec 7, 2020Updated 5 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆446Nov 30, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆145Nov 26, 2018Updated 7 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,504Sep 22, 2024Updated last year
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,318Jan 31, 2022Updated 4 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆24Aug 17, 2014Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆101Sep 15, 2025Updated 7 months ago