Kracken256 / ssh-keyfinderLinks
Automate ssh private key extraction from ssh-agent
☆21Updated 2 years ago
Alternatives and similar repositories for ssh-keyfinder
Users that are interested in ssh-keyfinder are comparing it to the libraries listed below
Sorting:
- WallEscape vulnerability in util-linux☆52Updated last year
- ☆105Updated 7 months ago
- Tiny embeddable dns server☆54Updated this week
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 5 months ago
- 🌒 Shell command obfuscation to avoid detection systems☆123Updated 3 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- NAT Slipstream attack code samples☆48Updated 4 years ago
- A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).☆84Updated 3 years ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆90Updated last month
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆118Updated 4 months ago
- eBPF hacks☆187Updated 11 months ago
- LDAP Swiss Army Knife☆49Updated last year
- Intercept stdin/stdout/stderr for any process☆199Updated 3 years ago
- KeyTrap (DNSSEC)☆43Updated last year
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆21Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 6 months ago
- CVE-2025-1974☆90Updated 7 months ago
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆26Updated 2 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆24Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆12Updated 9 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- New exploitation tricks for hardened .NET Remoting servers☆30Updated 3 months ago
- PAM Backdoor☆32Updated 2 years ago
- redirect all TCP/UDP traffic of any program to SOCKS5 proxy☆159Updated last year
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27Updated last year
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆51Updated 8 months ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 3 years ago
- Loads a program into a memfd and runs it.☆11Updated 3 years ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆13Updated 9 months ago