MegaManSec / SSH-SnakeLinks
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
β2,288Updated 3 months ago
Alternatives and similar repositories for SSH-Snake
Users that are interested in SSH-Snake are comparing it to the libraries listed below
Sorting:
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.β2,180Updated this week
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·β1,762Updated 2 months ago
- secator - the pentester's swiss knifeβ1,161Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,415Updated last year
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's nβ¦β710Updated this week
- The Network Execution Toolβ4,910Updated last week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channβ¦β983Updated last year
- Network Security Snifferβ837Updated last month
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5β846Updated last year
- SSH based reverse shellβ1,269Updated last week
- The useful exploit finderβ814Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β4,052Updated 5 months ago
- SSHamble: Unexpected Exposures in SSHβ1,157Updated 2 weeks ago
- Tunnel TCP connections through a fileβ971Updated this week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerabilityβ745Updated last year
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's β¦β591Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,186Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,471Updated 3 years ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.β2,173Updated this week
- SSH-MITM - ssh audits made simpleβ1,419Updated last week
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automatβ¦β2,224Updated last week
- Quickly discover exposed hosts on the internet using multiple search engines.β2,732Updated last month
- Connect like there is no firewall. Securely.β1,761Updated last month
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,166Updated last month
- This map lists the essential techniques to bypass anti-virus and EDRβ2,948Updated 7 months ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.β1,023Updated 2 weeks ago
- Generates millions of keyword-based password mutations in seconds.β1,375Updated 5 months ago
- PoC to record audio from a Bluetooth deviceβ1,507Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,366Updated 10 months ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.β1,574Updated last year