MegaManSec / SSH-SnakeLinks
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,296Updated 5 months ago
Alternatives and similar repositories for SSH-Snake
Users that are interested in SSH-Snake are comparing it to the libraries listed below
Sorting:
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,328Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,430Updated last year
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,781Updated 4 months ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆992Updated last year
- The Network Execution Tool☆5,165Updated last week
- secator - the pentester's swiss knife☆1,226Updated this week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆848Updated last year
- Network Security Sniffer☆836Updated 2 weeks ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆719Updated last month
- Connect like there is no firewall. Securely.☆1,794Updated 2 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆598Updated 3 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,276Updated this week
- SSH based reverse shell☆1,308Updated last month
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,238Updated 2 months ago
- The useful vulnerability and exploit finder☆817Updated this week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,534Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆755Updated last year
- SSHamble: Unexpected Exposures in SSH☆1,170Updated last week
- Passive hostname, domain and IP lookup tool for non-robots☆1,762Updated last month
- Hash type identifier (CLI & lib)☆932Updated last week
- PoC to record audio from a Bluetooth device☆1,543Updated last year
- Tunnel TCP connections through a file☆1,038Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,204Updated last month
- The recursive internet scanner for hackers. 🧡☆9,316Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- ☆718Updated last year
- Arsenal is just a quick inventory and launcher for hacking programs☆3,652Updated last year
- Portspoof☆2,399Updated last month
- Active Directory and Internal Pentest Cheatsheets☆1,982Updated last month
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆1,090Updated last week