runZeroInc / sshambleLinks
SSHamble: Unexpected Exposures in SSH
☆1,165Updated 2 weeks ago
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆426Updated 2 weeks ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,289Updated 4 months ago
- Threat-hunting tool for Linux☆1,024Updated 2 weeks ago
- Deep Linux runtime visibility meets Wireshark☆293Updated 3 weeks ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆989Updated last year
- A minimal TLS 1.2 client implementation in a pure Bash script☆351Updated 2 years ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆429Updated this week
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆963Updated last month
- A modular vulnerability scanner with automatic report generation capabilities.☆998Updated last week
- Passive hostname, domain and IP lookup tool for non-robots☆1,656Updated last week
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆708Updated last month
- 💀 Don't fear the Reaper 👻☆705Updated 3 weeks ago
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,370Updated this week
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 5 months ago
- Bitor Scanning Software☆435Updated last month
- #supply #chain #attack #detection☆603Updated this week
- opkssh (OpenPubkey SSH)☆1,771Updated this week
- secator - the pentester's swiss knife☆1,189Updated this week
- Validate the isolation posture of your container environment.☆304Updated 3 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,217Updated 2 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆581Updated last week
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆594Updated 2 months ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆384Updated last year
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆452Updated last month
- Tunnel TCP connections through a file☆972Updated 2 weeks ago
- SSH Session Monitoring Daemon☆525Updated 2 years ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆848Updated last year
- io_uring based rootkit☆245Updated 7 months ago
- A complete terminal user interface (TUI) for LDAP.☆828Updated 2 weeks ago
- A repo to conduct vulnerability enrichment.☆702Updated this week