Search the Community

Showing results for tags 'ssh'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 8 results

  1. sshLooter – Script To Steal SSH Passwords sshLooter is a Python script using a PAM module to steal SSH passwords by logging the password and notifying the admin of the script via Telegram when a user logs in rather than via strace which is not so reliable. ssHLooter was inspired to steal SSH passwords via another script using Python to implement a PAM module to log failed attempts, the author just had to change the location where passwords were logged. Download: [Hidden Content]
  2. Can someone help me with tolls to auto upload shell to sites and small guidance on how to do it properly. I also need a tool for ssh cracking/brute force
  3. Sshprank - A Fast SSH Mass-Scanner, Login Cracker And Banner Grabber Tool Using The Python-Masscan Module Description A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module. [HIDE][Hidden Content]]
  4. FaceSentry Access Control System version 6.4.8 facial biometric access control appliance ships with hard-coded and weak credentials for SSH access on port 23445 using the credentials wwwuser:123456. The root privilege escalation is done by abusing the insecure sudoers entry file. View the full article
  5. Multi-thread [+] Brute accepts IP lists and ranges, Check for black in spam sheets Check for offline and online location ( Check Tunnels for Speed Check for input on any password, non-password input SOCKS 5 Support [+] Brutus by login;pass Serial brute by login;Pass (IP list) Removes duplicates from beeps Flexible log setting by template Parsing strings for a check by template Easy to view log with the ability to immediately raise a slow tunnel Auto Save log in Excel format Hide the Brutus window by key combination [ + ] Saving settings and progress on exit Download socks by URL/from file by timer Brutus is not picky about iron [+] Masscan built-in [Hidden Content] Pass:
  6. CVE-2018-15473-Exploit Exploit written in Python for CVE-2018-15473 with threading and export formats Threading - default 5 If more than 10 are used, often the OpenSSH service gets overwhelmed and causes retries Single username evaluation via username parameter Multiple username evaluation via userList parameter Multiple username evaluation file output via outputFile parameter Multiple output formats (list, json, csv) via outputFormat parameter An example username input file is given in exampleInput.txt An example results output file in List format is given in exampleOutput.txt An example results output file in JSON format is given in exampleOutput.json An example results output file in CSV format is given in exampleOutput.csv Build the image: docker build -t cve-2018-15473 . Run the exploit: docker run cve-2018-15473 -h Delete containers and image: docker ps -a | awk '$2 == "cve-2018-15473" {print $1}' | xargs docker rm docker rmi cve-2018-15473 [Hidden Content]
  7. Eaton Xpert Meter version suffers from an SSH private key disclosure vulnerability. View the full article