Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for shell attacker
attacker
x
shell
x
47 search results found
Blocklist Ipsets
⭐
2,813
ipsets dynamically updated with firehol's update-ipsets.sh script
Platypus
⭐
1,372
🔨 A modern multiple reverse shell sessions manager written in go
Mitigating Web Shells
⭐
895
Guidance for mitigation web shells. #nsacyber
K8s Security
⭐
659
Kubernetes security notes and best practices
Instabrute
⭐
429
InstaBrute Two Ways to Brute-force Instagram Account Hacking
Decoymini
⭐
390
🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Prism
⭐
295
PRISM is an user space stealth reverse shell backdoor, written in pure C.
Betterbackdoor
⭐
262
A backdoor with a multitude of features.
Armor
⭐
238
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Nac_bypass
⭐
220
Script collection to bypass Network Access Control (NAC, 802.1x)
Honeypi
⭐
158
Shelljack
⭐
147
A keystroke / terminal logger for Linux.
Dockerpot
⭐
133
A docker based honeypot.
Qubes Antievilmaid
⭐
133
Qubes component: antievilmaid
Linux Luks Tpm Boot
⭐
126
A guide for setting up LUKS boot with a key from TPM in Linux
Massh Enum
⭐
107
OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
Cisco Cve 2020 3452 Scanner Exploiter
⭐
87
CISCO CVE-2020-3452 Scanner & Exploiter
Network Attacker
⭐
57
Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attack "
Cryptotrooper
⭐
50
The world's first Linux white-box ransomware
Security
⭐
49
Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.
Docker Devpi
⭐
48
Dockerfile for devpi pypi server
Plataoplomo
⭐
42
Collection of (at time of release) iOS bugs I found
Reverse Shell Access Kernel Module
⭐
38
This is a kernel module invoked reverse shell proof of concept.
Snuff
⭐
35
Automate ARP poisoning, ssltrip, and ettercap.
Kojoney2
⭐
33
Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret
Bootsy
⭐
25
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Pythonadvancedhttpreverseshell
⭐
19
Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.
Watchtower Example
⭐
14
Give LND's watchtowers a shot with your own simulated channel breach
Autorunalyzer
⭐
13
A Python script for performing analysis of the output from Microsoft's Sysinternals Autoruns.
Gitshell
⭐
12
A PoC .net shell which uses a GitHub.com repository for the communication channel.
The_scripter
⭐
9
The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.
Taf
⭐
9
The Archive Framework
Mock Dao Hack
⭐
9
Simplified "DAO" contract and attacker contract to recursively exploit it
Remoteshell
⭐
8
This project is a small project I completed while learning C's windowsAPI and network programming. After the backdoor runs on the client, an attacker on the server can obtain the shell of the client machine and execute the command.
Reverseshellcpp
⭐
8
A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process.
Reputationip
⭐
8
set of bash scripts to get a list of bad reputation IP addresses
Slack
⭐
7
Slack Tunneling for On-Site Attack-Defend CTFs
Name And Shame
⭐
7
Scan's logs and publically names and shames attackers via Twitter
Reverseshell
⭐
7
Attacker can use the scripts to gain reverse shell of a target's machine.
Secant
⭐
7
Security Cloud Assessment Tool
Ctmg
⭐
7
Read-only mirror of https://git.zx2c4.com/ctmg/about . Pull requests and issues on GitHub cannot be accepted and will be automatically closed.
Linuxmitm
⭐
6
Trespass
⭐
5
A php backdoor complete a python 3 attacker client.
Reverseshell
⭐
5
Reverse shell
Tor Experiment
⭐
5
Firepwner
⭐
5
Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability
Elk
⭐
5
Docker image for ElasticSearch, LogStash and Kibana
Related Searches
Shell Docker (20,660)
Shell Script (15,351)
Shell Bash (10,338)
Shell Command Line (6,542)
Shell Dotfiles (5,338)
Shell Git (4,715)
Shell Ansible (4,427)
Shell Server (3,563)
Shell Ssh (3,562)
Shell Docker Image (3,406)
1-47 of 47 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.