MegaManSec / SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,043Updated 8 months ago
Alternatives and similar repositories for SSH-Snake:
Users that are interested in SSH-Snake are comparing it to the libraries listed below
- Navigate the CVE jungle with ease.☆1,882Updated last week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,351Updated 11 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,566Updated 3 weeks ago
- The Network Execution Tool☆3,687Updated this week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆674Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,056Updated 2 weeks ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆963Updated last year
- The useful exploit finder☆805Updated 11 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆845Updated 11 months ago
- Tunnel TCP connections through a file☆925Updated 2 months ago
- The open source Tines / Splunk SOAR alternative for security and IT engineers. Built on simple YAML templates for integrations and respon…☆2,550Updated this week
- secator - the pentester's swiss knife☆977Updated this week
- SSH-MITM - ssh audits made simple☆1,379Updated 2 weeks ago
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,886Updated last year
- SSH based reverse shell☆1,055Updated this week
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆562Updated this week
- Various tips & tricks☆3,313Updated last week
- Connect like there is no firewall. Securely.☆1,646Updated this week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆726Updated last year
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,506Updated 11 months ago
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,174Updated last year
- Network Security Sniffer☆774Updated last week
- Adversary Emulation Framework☆9,063Updated last week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,162Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,626Updated 4 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,338Updated 3 months ago
- Differential fuzzing REPL for HTTP implementations.☆804Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,287Updated last month
- The Havoc Framework☆7,366Updated 2 months ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆954Updated 2 years ago