MegaManSec / SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,081Updated 9 months ago
Alternatives and similar repositories for SSH-Snake
Users that are interested in SSH-Snake are comparing it to the libraries listed below
Sorting:
- Navigate the CVE jungle with ease.☆1,991Updated 2 weeks ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,360Updated last year
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,584Updated 2 months ago
- The Network Execution Tool☆4,155Updated this week
- secator - the pentester's swiss knife☆1,015Updated this week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- Network Security Sniffer☆785Updated 2 weeks ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆726Updated last year
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆676Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,439Updated 2 years ago
- Differential testing framework for HTTP implementations☆826Updated last week
- Uncover the true IP address of websites safeguarded by Cloudflare & Others☆1,588Updated 3 weeks ago
- Connect like there is no firewall. Securely.☆1,680Updated 2 weeks ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,438Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,097Updated last week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆972Updated last year
- evilginx3 + gophish☆1,767Updated 10 months ago
- The useful exploit finder☆809Updated last year
- Fully featured and community-driven hacking environment☆2,370Updated 2 weeks ago
- SSH based reverse shell☆1,084Updated 2 weeks ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,764Updated 2 years ago
- Six Degrees of Domain Admin☆1,629Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,792Updated last month
- PoC to record audio from a Bluetooth device☆1,249Updated last year
- Tunnel TCP connections through a file☆928Updated this week
- Arsenal is just a quick inventory and launcher for hacking programs☆3,412Updated 5 months ago
- Adversary Emulation Framework☆9,312Updated this week
- ☆689Updated 10 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆564Updated last week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,653Updated 6 months ago