The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator passwords for environments where it is not possible or not appropriate to disable these local accounts. Clients may be configured to rotate passwords automatically. Stored passwords can be retrieved by desktop support …
☆131Jan 28, 2018Updated 8 years ago
Alternatives and similar repositories for SHIPS
Users that are interested in SHIPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆24Oct 8, 2014Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆51Apr 3, 2016Updated 10 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆339Sep 30, 2020Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆145Aug 9, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆36Nov 10, 2016Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆528Apr 13, 2017Updated 9 years ago
- ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.☆80Sep 15, 2016Updated 9 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆375Jul 30, 2024Updated last year
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆503Nov 17, 2022Updated 3 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆308Jul 28, 2024Updated last year
- Metasploit Framework☆31Dec 11, 2013Updated 12 years ago
- PoC code from blog☆17Mar 10, 2020Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Oct 15, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆50Nov 11, 2015Updated 10 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆252Nov 24, 2015Updated 10 years ago
- ☆17Jun 13, 2022Updated 3 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆55Jun 15, 2018Updated 7 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,041Jan 6, 2022Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆11Jan 14, 2021Updated 5 years ago
- AV/EDR evasion via direct system calls.☆34Dec 7, 2020Updated 5 years ago
- ☆82Nov 2, 2019Updated 6 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆447Nov 30, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆145Nov 26, 2018Updated 7 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,513Sep 22, 2024Updated last year
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Manage Engine Decrypter☆26Oct 17, 2022Updated 3 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 10 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,322Jan 31, 2022Updated 4 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆24Aug 17, 2014Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆102Sep 15, 2025Updated 8 months ago