RUB-NDS / Terrapin-ArtifactsLinks
This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆73Updated last year
Alternatives and similar repositories for Terrapin-Artifacts
Users that are interested in Terrapin-Artifacts are comparing it to the libraries listed below
Sorting:
- ☆135Updated last year
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆137Updated last year
- ☆84Updated 2 years ago
- MikroTik remote jailbreak for v6.x.x☆144Updated 2 years ago
- ☆101Updated 9 months ago
- ☆97Updated last year
- eBPF hacks☆188Updated 10 months ago
- io_uring based rootkit☆241Updated 6 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- ☆129Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆121Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- SnailLoad Demo Webserver☆36Updated 9 months ago
- ☆105Updated 10 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- Simple attacks on AES-ECB☆22Updated 4 years ago
- Simple CVE-2021-20294 poc☆11Updated 2 years ago
- A collection of tools for security research on Starlink's User Terminal☆152Updated 2 years ago
- ☆169Updated 3 years ago
- Repository for application-layer loop DoS☆32Updated last year
- Hack-A-Sat Qualifiers Writeups☆256Updated 2 years ago
- A tool for firmware cartography☆161Updated 4 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆42Updated last year
- Information for CVE-2024-3094☆53Updated last year
- Binarly Vulnerability Research Advisories☆182Updated 3 weeks ago
- Password-based key derivation function and password hashing scheme building upon scrypt☆178Updated last month
- Toolkit for creating cryptographic figures and videos.☆34Updated last year