This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆992Mar 17, 2024Updated 2 years ago
Alternatives and similar repositories for Terrapin-Scanner
Users that are interested in Terrapin-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,316Updated this week
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,400Updated this week
- The recursive internet scanner for hackers. 🧡☆9,538Updated this week
- ☆59Dec 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆8,607Updated this week
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆52Nov 3, 2025Updated 4 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,587Updated this week
- 🤖 The Modern Port Scanner 🤖☆19,496Updated this week
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,390Feb 15, 2026Updated last month
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆358Dec 14, 2023Updated 2 years ago
- The Network Execution Tool☆5,377Updated this week
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆4,148Sep 1, 2025Updated 6 months ago
- Find, verify, and analyze leaked credentials☆25,240Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,439Apr 17, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated 3 weeks ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 7 months ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆15,039Updated this week
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,449Jan 28, 2026Updated 2 months ago
- Check your WAF before an attacker does☆1,473Mar 14, 2026Updated 2 weeks ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,116Jan 6, 2026Updated 2 months ago
- Kerberoast with ACL abuse capabilities☆626Dec 16, 2024Updated last year
- An OOB interaction gathering server and client library☆4,251Updated this week
- Passively check for XSS character encodings☆18Mar 9, 2026Updated 2 weeks ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆312Mar 31, 2024Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,636Nov 14, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆631Mar 20, 2026Updated last week
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,065Updated this week
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆3,436Feb 28, 2026Updated last month