Runs sshd as a unprivileged user for persistence
☆11Jun 23, 2019Updated 6 years ago
Alternatives and similar repositories for sshdoor
Users that are interested in sshdoor are comparing it to the libraries listed below
Sorting:
- ☆18Jun 18, 2021Updated 4 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆13Jul 24, 2021Updated 4 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- ☆11Dec 27, 2023Updated 2 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Updated GNU Screen 4.5.0 Exploit: This repository hosts an enhanced exploit for GNU Screen 4.5.0, optimized for Kali Linux 2024. It inclu…☆20Jun 10, 2024Updated last year
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Exploit iDRAC 7 & 8 firmware < 2.52.52.52☆17Dec 10, 2021Updated 4 years ago
- How to monitor a Zimbra Collaboration Environment using pflogsumm and NET-SNMP-EXTEND☆12Oct 25, 2017Updated 8 years ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- RCE Exploit for Gitlab < 13.10.3☆62Jun 4, 2021Updated 4 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- ☆12Feb 20, 2025Updated last year
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Apr 26, 2021Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Jun 11, 2023Updated 2 years ago
- A reconnaissance tool for ethical hackers written in RUST☆21Apr 8, 2024Updated last year
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- SSL man-in-the-middle tool targeting iOS devices < 4.3.5☆37Aug 24, 2011Updated 14 years ago