MegaManSec / SSH-SnakeLinks
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,244Updated last month
Alternatives and similar repositories for SSH-Snake
Users that are interested in SSH-Snake are comparing it to the libraries listed below
Sorting:
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,094Updated last week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,391Updated last year
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,721Updated this week
- secator - the pentester's swiss knife☆1,141Updated last week
- The Network Execution Tool☆4,671Updated this week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- Tunnel TCP connections through a file☆955Updated last week
- The useful exploit finder☆811Updated last year
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆983Updated last year
- Connect like there is no firewall. Securely.☆1,741Updated 2 months ago
- SSH based reverse shell☆1,236Updated 3 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,162Updated 4 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆585Updated last month
- Network Security Sniffer☆814Updated last month
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆517Updated last year
- SSHamble: Unexpected Exposures in SSH☆1,141Updated last week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,232Updated 3 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆736Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,879Updated 3 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆699Updated 5 months ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,041Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,907Updated 5 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,465Updated 2 years ago
- Active Directory and Internal Pentest Cheatsheets☆1,733Updated last week
- SSH-MITM - ssh audits made simple☆1,406Updated 2 weeks ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,786Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,145Updated 10 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,325Updated 7 months ago
- Uncover the true IP address of websites safeguarded by Cloudflare & Others☆1,918Updated 4 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,573Updated 3 months ago