fox-it / OpenSSH-Network-Parser
Project to decrypt and parse SSH traffic
☆63Updated 4 years ago
Alternatives and similar repositories for OpenSSH-Network-Parser:
Users that are interested in OpenSSH-Network-Parser are comparing it to the libraries listed below
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆83Updated 7 months ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆98Updated 3 years ago
- ☆54Updated 6 months ago
- Cisco ASA Software and ASDM Security Research☆80Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆95Updated last year
- Linux EDR written in Golang and based on eBPF.☆232Updated 2 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 4 years ago
- Proxy Unix applications in the terminal☆113Updated 3 years ago
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆23Updated 4 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆62Updated last year
- Passive Security Tools Fingerprinting Framework☆72Updated 3 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- Volatility Explorer Suit☆62Updated 2 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆72Updated 3 years ago
- Linux kernel exploits for local privilege escalation☆77Updated 6 years ago
- ☆91Updated 3 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆78Updated 3 months ago
- Presentations from the CX Security Labs team☆33Updated 3 months ago
- Scapy hands-on☆35Updated last year
- ☆19Updated 4 years ago
- simple YARA-based IOC scanner☆165Updated last week
- Zyxel password decrypter☆36Updated 2 years ago
- ☆38Updated last year
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- Domain Borrowing PoC☆210Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆43Updated last year
- Linux process memory dumper in BASH☆39Updated 8 years ago
- ☆45Updated 3 years ago