This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆990Mar 17, 2024Updated 2 years ago
Alternatives and similar repositories for Terrapin-Scanner
Users that are interested in Terrapin-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,318Mar 25, 2026Updated 3 weeks ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,412Apr 6, 2026Updated last week
- The recursive internet scanner for hackers. 🧡☆9,602Updated this week
- ☆59Dec 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆8,688Apr 11, 2026Updated last week
- Template Nuclei SSTI☆34Nov 18, 2025Updated 5 months ago
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆52Nov 3, 2025Updated 5 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,896Updated this week
- 🤖 The Modern Port Scanner 🤖☆19,610Updated this week
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated 2 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,459Feb 15, 2026Updated 2 months ago
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆357Dec 14, 2023Updated 2 years ago
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆4,164Sep 1, 2025Updated 7 months ago
- Find, verify, and analyze leaked credentials☆25,771Updated this week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,441Apr 17, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,166Mar 8, 2026Updated last month
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆15,284Updated this week
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 8 months ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,502Jan 28, 2026Updated 2 months ago
- Check your WAF before an attacker does☆1,475Mar 14, 2026Updated last month
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated last month
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,129Jan 6, 2026Updated 3 months ago
- Kerberoast with ACL abuse capabilities☆632Dec 16, 2024Updated last year
- Passively check for XSS character encodings☆18Mar 9, 2026Updated last month
- An OOB interaction gathering server and client library☆4,272Apr 6, 2026Updated 2 weeks ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆312Mar 31, 2024Updated 2 years ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,660Apr 10, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆631Apr 10, 2026Updated last week
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,074Mar 24, 2026Updated 3 weeks ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago