runZeroInc / sshambleLinks
SSHamble: Unexpected Exposures in SSH
☆1,157Updated 2 weeks ago
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- Threat-hunting tool for Linux☆1,013Updated last week
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆418Updated this week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,288Updated 3 months ago
- Deep Linux runtime visibility meets Wireshark☆295Updated last week
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,362Updated this week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆983Updated last year
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆960Updated last week
- Bitor Scanning Software☆431Updated last week
- secator - the pentester's swiss knife☆1,161Updated this week
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 4 months ago
- A modular vulnerability scanner with automatic report generation capabilities.☆969Updated last week
- 💀 Don't fear the Reaper 👻☆696Updated this week
- Passive hostname, domain and IP lookup tool for non-robots☆1,650Updated 2 months ago
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆705Updated last month
- Simple Wireguard 2FA☆653Updated last month
- #supply #chain #attack #detection☆565Updated this week
- A repo to conduct vulnerability enrichment.☆696Updated this week
- A minimal TLS 1.2 client implementation in a pure Bash script☆352Updated 2 years ago
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆1,962Updated last month
- The useful exploit finder☆814Updated last year
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆591Updated last month
- Tunnel TCP connections through a file☆971Updated this week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆846Updated last year
- Kingfisher is a blazingly fast and highly accurate tool for secret detection and live validation across files, Git repos, GitHub, GitLab,…☆620Updated this week
- io_uring based rootkit☆243Updated 6 months ago
- A complete terminal user interface (TUI) for LDAP.☆816Updated 3 weeks ago
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆448Updated last week
- Zaps arguments and environment from the process list☆235Updated last year
- Pen Test Report Generation and Assessment Collaboration☆574Updated last week
- CI/CD Security Analyzer☆718Updated 8 months ago