The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator passwords for environments where it is not possible or not appropriate to disable these local accounts. Clients may be configured to rotate passwords automatically. Stored passwords can be retrieved by desktop support …
☆130Jan 28, 2018Updated 8 years ago
Alternatives and similar repositories for SHIPS
Users that are interested in SHIPS are comparing it to the libraries listed below
Sorting:
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 9 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆337Sep 30, 2020Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.☆79Sep 15, 2016Updated 9 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆368Jul 30, 2024Updated last year
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆502Nov 17, 2022Updated 3 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆308Jul 28, 2024Updated last year
- Metasploit Framework☆29Dec 11, 2013Updated 12 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆49Nov 11, 2015Updated 10 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,044Jan 6, 2022Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- AV/EDR evasion via direct system calls.☆33Dec 7, 2020Updated 5 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆445Nov 30, 2023Updated 2 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆145Nov 26, 2018Updated 7 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,498Sep 22, 2024Updated last year
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,310Jan 31, 2022Updated 4 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- ☆100Sep 15, 2025Updated 6 months ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago