CrzPhil / SSHniffLinks
An SSH metadata analyser used to showcase a timing-based attack on the protocol.
☆28Updated last year
Alternatives and similar repositories for SSHniff
Users that are interested in SSHniff are comparing it to the libraries listed below
Sorting:
- Signing-key abuse and update exploitation framework☆130Updated 5 months ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆139Updated this week
- Get root via TTY / TIOCSTI stuffing☆76Updated 5 months ago
- Zaps arguments and environment from the process list☆234Updated last year
- WallEscape vulnerability in util-linux☆52Updated last year
- Manjaro LPE☆34Updated 2 years ago
- Utility to find hidden Linux kernel modules☆146Updated 3 months ago
- A library for intercepting system calls☆104Updated 10 months ago
- ☆135Updated last year
- ☆23Updated last year
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆100Updated 2 years ago
- ☆84Updated 2 years ago
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆143Updated last week
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 5 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆196Updated last year
- A simple Meterpreter stager written in Rust.☆42Updated last week
- A way to use fonts to obfuscate text.☆48Updated 2 years ago
- Network Traffic Fuzzer☆18Updated 10 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 10 months ago
- eBPF hacks☆188Updated 10 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆114Updated 3 months ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆98Updated 2 years ago
- ☆11Updated 3 years ago
- Toolkit for creating cryptographic figures and videos.☆34Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆137Updated last year
- io_uring based rootkit☆241Updated 6 months ago
- Detect and remove the presence of canary tokens☆23Updated last year
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 3 years ago
- Phrack Crackme Challenges☆20Updated 6 months ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago