tylermenezes / FakeSSH
Fake SSH server for confusing spammers, because we all know security through obscurity rocks.
☆43Updated 8 years ago
Alternatives and similar repositories for FakeSSH:
Users that are interested in FakeSSH are comparing it to the libraries listed below
- Print code and markup beautifully and quick as lightning on paper.☆17Updated 8 years ago
- ASM Malicious code - PE infector☆70Updated 8 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- Give the NSA free backdoor access to your Flask app.☆185Updated 11 years ago
- Extraction of iMessage Data via XSS☆53Updated 8 years ago
- [DEPRECATED] HTTP proxy to bypass school networks in workshops☆10Updated 7 years ago
- OS X rootkit loader version #1☆18Updated 9 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 8 years ago
- The classic Windows XP logo screen saver for, of all things, OS X.☆11Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- https://ghostbin.com☆192Updated 5 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- a bash script that generates hearty laughter☆16Updated 9 years ago
- IOHIDFamily 0day☆443Updated 2 years ago
- CVE-2016-5195 exploit written in Crystal☆12Updated 8 years ago
- ☆35Updated 3 months ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- PPPoAT - PPP over Any Transport☆22Updated 3 years ago
- Code for testing krackattacks☆10Updated 7 years ago
- ☆12Updated 8 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago