MegaManSec / SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,028Updated 6 months ago
Alternatives and similar repositories for SSH-Snake:
Users that are interested in SSH-Snake are comparing it to the libraries listed below
- Navigate the CVE jungle with ease.☆1,847Updated this week
- The Network Execution Tool☆3,601Updated this week
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,539Updated last week
- Connect like there is no firewall. Securely.☆1,617Updated 2 weeks ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,346Updated 10 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆664Updated 2 weeks ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆962Updated 11 months ago
- secator - the pentester's swiss knife☆951Updated last week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated 10 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,014Updated 3 weeks ago
- The open source Tines / Splunk SOAR alternative for security and IT engineers. Built on simple YAML templates for integrations and respon…☆2,518Updated this week
- SSH-MITM - ssh audits made simple☆1,365Updated last month
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆724Updated last year
- Tunnel TCP connections through a file☆920Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆557Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,150Updated this week
- The useful exploit finder☆797Updated 10 months ago
- Portspoof☆2,158Updated last month
- Various tips & tricks☆3,250Updated this week
- Six Degrees of Domain Admin☆1,383Updated this week
- Invisible network protocol sniffer☆755Updated 5 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,241Updated 3 weeks ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆538Updated 3 months ago
- Differential fuzzing REPL for HTTP implementations.☆771Updated this week
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆505Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,381Updated 2 years ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆1,768Updated this week
- Adversary Emulation Framework☆8,915Updated this week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,126Updated last month
- evilginx3 + gophish☆1,718Updated 8 months ago