RUB-NDS / Terrapin-Scanner
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
☆972Updated last year
Alternatives and similar repositories for Terrapin-Scanner
Users that are interested in Terrapin-Scanner are comparing it to the libraries listed below
Sorting:
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,081Updated 9 months ago
- SSHamble: Unexpected Exposures in SSH☆958Updated 2 weeks ago
- Navigate the CVE jungle with ease.☆1,991Updated 2 weeks ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,360Updated last year
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆676Updated last month
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,512Updated last year
- An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform☆943Updated last month
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,584Updated 2 months ago
- Original PoC for CVE-2023-32784☆641Updated last year
- ☆344Updated last year
- Tunnel TCP connections through a file☆928Updated this week
- PoC for CVE-2023-4911☆385Updated last year
- Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487☆230Updated last year
- Nmap Dashboard Mini Project☆584Updated 11 months ago
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆531Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,097Updated last week
- The useful exploit finder☆809Updated last year
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆564Updated last week
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆280Updated 10 months ago
- CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH☆487Updated last week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆938Updated last month
- CI/CD Security Analyzer☆658Updated 2 months ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,012Updated this week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,220Updated 9 months ago
- Differential testing framework for HTTP implementations☆826Updated last week
- SSH based reverse shell☆1,084Updated 2 weeks ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆726Updated last year
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,538Updated last year
- Automating situational awareness for cloud penetration tests.☆2,104Updated 2 months ago