The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator passwords for environments where it is not possible or not appropriate to disable these local accounts. Clients may be configured to rotate passwords automatically. Stored passwords can be retrieved by desktop support …
☆129Jan 28, 2018Updated 8 years ago
Alternatives and similar repositories for SHIPS
Users that are interested in SHIPS are comparing it to the libraries listed below
Sorting:
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Aug 9, 2015Updated 10 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆336Sep 30, 2020Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Apr 13, 2017Updated 8 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆501Nov 17, 2022Updated 3 years ago
- ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.☆79Sep 15, 2016Updated 9 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Jul 30, 2024Updated last year
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆308Jul 28, 2024Updated last year
- Metasploit Framework☆29Dec 11, 2013Updated 12 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆49Nov 11, 2015Updated 10 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆444Nov 30, 2023Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,044Jan 6, 2022Updated 4 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,494Sep 22, 2024Updated last year
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆144Nov 26, 2018Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- AV/EDR evasion via direct system calls.☆33Dec 7, 2020Updated 5 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,307Jan 31, 2022Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Brute Force Detection (BFD)☆25Updated this week
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago