MegaManSec / SSH-SnakeLinks
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,087Updated 11 months ago
Alternatives and similar repositories for SSH-Snake
Users that are interested in SSH-Snake are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,374Updated last year
- Navigate the CVE jungle with ease.☆2,025Updated last week
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,612Updated this week
- secator - the pentester's swiss knife☆1,080Updated this week
- The Network Execution Tool☆4,323Updated this week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆845Updated last year
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,122Updated last month
- The useful exploit finder☆814Updated last year
- SSH based reverse shell☆1,133Updated last month
- Network Security Sniffer☆797Updated 2 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆682Updated 2 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,572Updated last month
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆729Updated last year
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆977Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,262Updated 5 months ago
- ☆694Updated last year
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,138Updated last month
- Credentials Dumper for Linux using eBPF☆1,143Updated 9 months ago
- Connect like there is no firewall. Securely.☆1,700Updated 2 weeks ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆616Updated 7 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,841Updated 2 months ago
- Tunnel TCP connections through a file☆939Updated 2 weeks ago
- Differential testing framework for HTTP implementations☆833Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆574Updated this week
- Active Directory and Internal Pentest Cheatsheets☆1,537Updated 3 weeks ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,977Updated last month
- The Havoc Framework☆7,621Updated 5 months ago
- Hash type identifier (CLI & lib)☆880Updated 2 weeks ago
- PoC to record audio from a Bluetooth device☆1,317Updated last year
- SSHamble: Unexpected Exposures in SSH☆966Updated last month