CrzPhil / SSHniffLinks
An SSH metadata analyser used to showcase a timing-based attack on the protocol.
☆28Updated last year
Alternatives and similar repositories for SSHniff
Users that are interested in SSHniff are comparing it to the libraries listed below
Sorting:
- Zaps arguments and environment from the process list☆209Updated last year
- Signing-key abuse and update exploitation framework☆130Updated 2 months ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆135Updated last month
- Utility to find hidden Linux kernel modules☆144Updated last week
- A library for intercepting system calls☆101Updated 6 months ago
- ☆134Updated last year
- ☆23Updated 10 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆68Updated last week
- Manjaro LPE☆34Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- ☆82Updated last year
- io_uring based rootkit☆216Updated 3 months ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Updated 2 years ago
- A way to use fonts to obfuscate text.☆45Updated 2 years ago
- SOCKS for your subnet☆20Updated 2 years ago
- Fuzz Network Traffic☆18Updated 7 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- DEbian Cve REproducer Tool☆25Updated last week
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆27Updated 2 years ago
- A simple Meterpreter stager written in Rust.☆38Updated 10 months ago
- eBPF hacks☆188Updated 7 months ago
- ☆46Updated last month
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆133Updated last week
- Minimal setup to trigger the xz backdoor☆28Updated 9 months ago
- ☆10Updated 3 years ago
- ☆123Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆168Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆14Updated 2 weeks ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year