CrzPhil / SSHniffLinks
An SSH metadata analyser used to showcase a timing-based attack on the protocol.
☆28Updated last year
Alternatives and similar repositories for SSHniff
Users that are interested in SSHniff are comparing it to the libraries listed below
Sorting:
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆135Updated last month
- Signing-key abuse and update exploitation framework☆130Updated 3 months ago
- Zaps arguments and environment from the process list☆211Updated last year
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆99Updated 2 years ago
- Manjaro LPE☆34Updated 2 years ago
- Utility to find hidden Linux kernel modules☆144Updated last month
- A library for intercepting system calls☆101Updated 7 months ago
- ☆23Updated 11 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆104Updated 3 weeks ago
- ☆82Updated 2 years ago
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆133Updated last month
- A way to use fonts to obfuscate text.☆46Updated 2 years ago
- ☆134Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆15Updated 7 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- A simple Meterpreter stager written in Rust.☆40Updated 11 months ago
- An eBPF🐝 Keylogger with C2-based RCE payload delivery☆285Updated 3 months ago
- Detect and remove the presence of canary tokens☆22Updated last year
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆14Updated last month
- eBPF hacks☆187Updated 8 months ago
- ☆10Updated 3 years ago
- Make your programs stealthier🐝☆177Updated 2 months ago
- Keep it secret, keep it safe☆76Updated 6 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- ☆35Updated last year
- Fuzz Network Traffic☆18Updated 7 months ago