MegaManSec / SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
☆2,006Updated 5 months ago
Alternatives and similar repositories for SSH-Snake:
Users that are interested in SSH-Snake are comparing it to the libraries listed below
- Navigate the CVE jungle with ease.☆1,822Updated last week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,325Updated 9 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,510Updated 3 weeks ago
- The Network Execution Tool☆3,487Updated this week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆843Updated 8 months ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆961Updated 10 months ago
- Invisible network protocol sniffer☆747Updated 4 months ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,497Updated last month
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆661Updated 3 weeks ago
- Connect like there is no firewall. Securely.☆1,575Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆961Updated last month
- The useful exploit finder☆793Updated 9 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,373Updated 2 years ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆556Updated this week
- Tunnel TCP connections through a file☆909Updated 3 months ago
- Adversary Emulation Framework☆8,782Updated this week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆708Updated 10 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,049Updated 2 weeks ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,880Updated 2 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,095Updated 5 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆907Updated last month
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,732Updated 2 years ago
- secator - the pentester's swiss knife☆922Updated this week
- The Havoc Framework☆7,085Updated this week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,504Updated 9 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,072Updated 5 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,052Updated 2 months ago
- The open source Tines / Splunk SOAR alternative for security engineers.☆2,475Updated this week
- Differential fuzzing REPL for HTTP implementations.☆727Updated 2 weeks ago