MegaManSec / SSH-SnakeLinks
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,299Updated 6 months ago
Alternatives and similar repositories for SSH-Snake
Users that are interested in SSH-Snake are comparing it to the libraries listed below
Sorting:
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,353Updated 2 weeks ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,432Updated last year
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,791Updated 4 months ago
- secator - the pentester's swiss knife☆1,234Updated last week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆992Updated last year
- The Network Execution Tool☆5,234Updated last week
- Connect like there is no firewall. Securely.☆1,804Updated 2 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,289Updated this week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆721Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆601Updated 3 months ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,243Updated 2 months ago
- The useful exploit finder☆825Updated 2 weeks ago
- Network Security Sniffer☆838Updated last month
- Tunnel TCP connections through a file☆1,039Updated 2 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,255Updated 2 months ago
- SSH based reverse shell☆1,314Updated last week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆848Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆757Updated last year
- SSHamble: Unexpected Exposures in SSH☆1,173Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆3,142Updated 10 months ago
- Hash type identifier (CLI & lib)☆941Updated 2 weeks ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆4,088Updated 5 months ago
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆1,339Updated this week
- SSH-MITM - ssh audits made simple☆1,428Updated last week
- Passive hostname, domain and IP lookup tool for non-robots☆1,773Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,189Updated 4 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,676Updated last year
- 🚀 Caido releases, wiki and roadmap☆2,147Updated last week
- Active Directory and Internal Pentest Cheatsheets☆2,029Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Updated 3 years ago