Kracken256 / ssh-keyfinderLinks
Automate ssh private key extraction from ssh-agent
☆21Updated 2 years ago
Alternatives and similar repositories for ssh-keyfinder
Users that are interested in ssh-keyfinder are comparing it to the libraries listed below
Sorting:
- KeyTrap (DNSSEC)☆42Updated last year
- WallEscape vulnerability in util-linux☆52Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆127Updated 4 months ago
- redirect all TCP/UDP traffic of any program to SOCKS5 proxy☆158Updated last year
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆80Updated 2 weeks ago
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆51Updated 7 months ago
- A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).☆82Updated 3 years ago
- ☆104Updated 6 months ago
- 🌒 Shell command obfuscation to avoid detection systems☆123Updated 3 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- Golang Port Knocking for Linux + Windows☆18Updated 3 years ago
- ☆42Updated 3 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆19Updated last year
- PoC and Detection for CVE-2024-21626☆75Updated last year
- eBPF hacks☆186Updated 10 months ago
- End-to-end Encrypted DNS Tunnelling and C2 framework☆81Updated 8 months ago
- This tool have the power to hide any PID/directory in the Linux kernel☆29Updated last year
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆96Updated last month
- kubernetes rootkit☆35Updated last year
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆30Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 4 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- A fork of the Go language with some tweaks☆53Updated 8 months ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- ☆40Updated last year
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆119Updated 2 months ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆13Updated 8 months ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆29Updated 8 months ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27Updated last year