RUB-NDS / Terrapin-ArtifactsLinks
This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆73Updated last year
Alternatives and similar repositories for Terrapin-Artifacts
Users that are interested in Terrapin-Artifacts are comparing it to the libraries listed below
Sorting:
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- ☆136Updated last year
- ☆85Updated 2 years ago
- ☆106Updated 11 months ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆80Updated 2 years ago
- Simple attacks on AES-ECB☆22Updated 5 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆60Updated last year
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- Toolkit for creating cryptographic figures and videos.☆35Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- ☆97Updated last year
- SnailLoad Demo Webserver☆38Updated 10 months ago
- PCAP-over-IP server written in Golang☆38Updated 6 months ago
- ☆52Updated last year
- Repository for application-layer loop DoS☆33Updated last year
- io_uring based rootkit☆244Updated 8 months ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆145Updated last year
- ☆131Updated 2 years ago
- Password-based key derivation function and password hashing scheme building upon scrypt☆180Updated 3 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Updated 2 months ago
- CQ, a code security scanner☆100Updated last year
- Trail of Bits Testing Handbook - appsec.guide☆87Updated this week
- ☆42Updated 2 years ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆42Updated last year
- MikroTik remote jailbreak for v6.x.x☆149Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- Network traffic analysis tool for Attack & Defense CTF's☆111Updated last week
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆125Updated last month