This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆990Mar 17, 2024Updated last year
Alternatives and similar repositories for Terrapin-Scanner
Users that are interested in Terrapin-Scanner are comparing it to the libraries listed below
Sorting:
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆73May 3, 2024Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,314Jul 27, 2025Updated 7 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,381Mar 2, 2026Updated last week
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- The recursive internet scanner for hackers. 🧡☆9,468Updated this week
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆8,529Updated this week
- ☆59Dec 15, 2023Updated 2 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,300Mar 2, 2026Updated last week
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆357Dec 14, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆52Nov 3, 2025Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Find, verify, and analyze leaked credentials☆24,933Updated this week
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19,348Feb 20, 2026Updated 2 weeks ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 6 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,158Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,434Apr 17, 2024Updated last year
- The Network Execution Tool☆5,315Updated this week
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆32,947Updated this week
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Feb 9, 2024Updated 2 years ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆14,881Updated this week
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi …☆2,109Jan 6, 2026Updated 2 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆732Jan 25, 2026Updated last month
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆311Mar 31, 2024Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,607Nov 14, 2025Updated 3 months ago
- Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487☆241Jan 8, 2024Updated 2 years ago
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,130Dec 21, 2025Updated 2 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Sep 23, 2025Updated 5 months ago
- An OOB interaction gathering server and client library☆4,218Updated this week
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Updated this week
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,362Jan 28, 2026Updated last month
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆4,118Sep 1, 2025Updated 6 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,304Updated this week