runZeroInc / sshambleLinks
SSHamble: Unexpected Exposures in SSH
☆971Updated 3 weeks ago
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- Threat-hunting tool for Linux☆948Updated last month
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,127Updated last week
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,217Updated this week
- opkssh (OpenPubkey SSH)☆1,625Updated this week
- Deep Linux runtime visibility meets Wireshark☆292Updated last week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆394Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆388Updated this week
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆675Updated 2 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆224Updated 3 weeks ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆985Updated last year
- secator - the pentester's swiss knife☆1,127Updated last week
- 💀 Don't fear the Reaper 👻☆563Updated this week
- Bitor Scanning Software☆401Updated this week
- A minimal TLS 1.2 client implementation in a pure Bash script☆352Updated last year
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆416Updated this week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,526Updated last year
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated last month
- Passive hostname, domain and IP lookup tool for non-robots☆1,561Updated last week
- Pen Test Report Generation and Assessment Collaboration☆537Updated this week
- Simple Wireguard 2FA☆616Updated last week
- A complete terminal user interface (TUI) for LDAP.☆745Updated 2 weeks ago
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆973Updated last week
- Tunnel TCP connections through a file☆947Updated 3 weeks ago
- A modular vulnerability scanner with automatic report generation capabilities.☆688Updated this week
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆1,857Updated 3 months ago
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆3,400Updated 11 months ago
- Autoswagger by Intruder - detect API auth weaknesses☆705Updated last week
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆380Updated last year
- Validate the isolation posture of your container environment.☆294Updated last month
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆737Updated 3 months ago