MegaManSec / SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆1,987Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for SSH-Snake
- Navigate the CVE jungle with ease.☆1,772Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,284Updated 7 months ago
- The Network Execution Tool☆3,281Updated last week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆841Updated 7 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,459Updated 3 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆687Updated 9 months ago
- Invisible network protocol sniffer☆723Updated 3 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆654Updated 3 months ago
- secator - the pentester's swiss knife☆868Updated last week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆944Updated 8 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆544Updated this week
- Tunnel TCP connections through a file☆893Updated last month
- PoC to record audio from a Bluetooth device☆914Updated 7 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆2,832Updated 2 weeks ago
- game of active directory☆5,444Updated this week
- Differential fuzzing REPL for HTTP implementations.☆715Updated last week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,495Updated 7 months ago
- ☆646Updated 4 months ago
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆496Updated 10 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,338Updated 11 months ago
- The useful exploit finder☆784Updated 7 months ago
- The Havoc Framework☆6,872Updated this week
- Adversary Emulation Framework☆8,567Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆936Updated this week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,725Updated last year
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,007Updated 8 months ago
- SSHamble: Unexpected Exposures in SSH☆914Updated last week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆781Updated this week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,008Updated 2 weeks ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,058Updated 3 weeks ago