This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆73May 3, 2024Updated last year
Alternatives and similar repositories for Terrapin-Artifacts
Users that are interested in Terrapin-Artifacts are comparing it to the libraries listed below
Sorting:
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- A package of utilities to record and work with multicast radar data in ASTERIX format. (radar as in air navigation surveillance).☆15Jul 17, 2025Updated 7 months ago
- Eurocontrol Asterix decoder framework based on XML declarations☆10Jan 26, 2023Updated 3 years ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆990Mar 17, 2024Updated last year
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- asterix coder and decoder by python☆16Jul 12, 2020Updated 5 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- Homebrew formula for Oh my Posh☆18Feb 26, 2026Updated last week
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- KeyTrap (DNSSEC)☆44Feb 18, 2024Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Oct 12, 2023Updated 2 years ago
- Golang based tools for taking PC-compatible ELFs and generating fake SELFs that run on the PlayStation 4.☆27Jan 4, 2026Updated 2 months ago
- Purpose-built Red Team network hardware implant made from common components.☆27Mar 18, 2023Updated 2 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- Pure python library for decoding Eurocontrol Asterix binary data☆27Jun 13, 2022Updated 3 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- ☆11Nov 13, 2024Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- Binary Ninja plugin to provide LLM assistance analyzing binaries.☆49Mar 2, 2026Updated last week
- GoROM manages ROM sets and torrents for game emulators such as MAME and includes both a command-line version and a cross-platform GUI.☆26Sep 25, 2021Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 8 months ago
- This SDK allows web-based apps/pages to interact with dictation devices☆17Feb 12, 2026Updated 3 weeks ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- ☆35Aug 30, 2024Updated last year
- Some tips to limited the access to the cam DG-M1Q☆28Jun 20, 2019Updated 6 years ago
- 91-95 Jeep and Dodge EPROMS☆13Nov 25, 2025Updated 3 months ago
- Бот для пересылки сообщений из MAX в Telegram☆39Feb 11, 2026Updated 3 weeks ago
- ☆10Sep 24, 2021Updated 4 years ago
- Adabas & Natural Education Package☆12Jan 25, 2023Updated 3 years ago
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated 2 weeks ago
- A tiny ASCII fantasy console☆11Nov 13, 2025Updated 3 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime…☆12Sep 10, 2020Updated 5 years ago
- Miscellaneous small bits and bobs.☆11Sep 8, 2025Updated 6 months ago
- ☆11May 27, 2025Updated 9 months ago
- ☆11Dec 23, 2018Updated 7 years ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆46Jun 5, 2025Updated 9 months ago