RUB-NDS / Terrapin-ScannerLinks
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆983Updated last year
Alternatives and similar repositories for Terrapin-Scanner
Users that are interested in Terrapin-Scanner are comparing it to the libraries listed below
Sorting:
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,244Updated last month
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,094Updated last week
- CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH☆496Updated 3 months ago
- SSHamble: Unexpected Exposures in SSH☆1,141Updated last week
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,721Updated this week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,001Updated 5 months ago
- A modular vulnerability scanner with automatic report generation capabilities.☆932Updated this week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆699Updated 5 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- secator - the pentester's swiss knife☆1,141Updated last week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆818Updated last week
- The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nu…☆298Updated last week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,391Updated last year
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,045Updated this week
- The useful exploit finder☆811Updated last year
- ☆399Updated last month
- Containers for running the Greenbone Vulnerability Manager. Run as a single container with all services or separate single applications c…☆421Updated 2 weeks ago
- Nmap Dashboard Mini Project☆616Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,145Updated 10 months ago
- A tool to perform DNS reconnaissance on target networks. Among the DNS information got from include subdomains, mx records, web applicati…☆343Updated last year
- Tunnel TCP connections through a file☆955Updated last week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,238Updated last year
- Pen Test Report Generation and Assessment Collaboration☆563Updated 2 weeks ago
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,014Updated this week
- Network Security Sniffer☆814Updated last month
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆412Updated this week
- Swaks - Swiss Army Knife for SMTP☆1,138Updated last year
- Original PoC for CVE-2023-32784☆645Updated 2 years ago
- Passive hostname, domain and IP lookup tool for non-robots☆1,620Updated last week
- Differential testing framework for HTTP implementations☆880Updated last week