runZeroInc / sshambleLinks
SSHamble: Unexpected Exposures in SSH
☆1,173Updated last week
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- Threat-hunting tool for Linux☆1,033Updated last week
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆432Updated this week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,299Updated 6 months ago
- Bitor Scanning Software☆453Updated 3 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated this week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆992Updated last year
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,402Updated this week
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆718Updated 3 months ago
- secator - the pentester's swiss knife☆1,234Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆1,114Updated this week
- Deep Linux runtime visibility meets Wireshark☆302Updated 2 months ago
- Pen Test Report Generation and Assessment Collaboration☆589Updated last week
- opkssh (OpenPubkey SSH)☆1,809Updated last week
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆233Updated 7 months ago
- CI/CD Security Analyzer☆729Updated 11 months ago
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆1,339Updated this week
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆977Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,353Updated 2 weeks ago
- 💀 Don't fear the Reaper 👻☆818Updated 2 weeks ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆384Updated last year
- Open Adversarial Exposure Validation Platform☆1,609Updated this week
- Tunnel TCP connections through a file☆1,039Updated 2 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆841Updated 11 months ago
- MikroTik RouterOS Security Inspector☆303Updated last week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 7 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆898Updated 3 weeks ago
- A complete terminal user interface (TUI) for LDAP.☆877Updated last month
- io_uring based rootkit☆249Updated 9 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,432Updated last year
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,539Updated last year