runZeroInc / sshambleLinks
SSHamble: Unexpected Exposures in SSH
☆1,166Updated 3 weeks ago
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,294Updated 5 months ago
- Threat-hunting tool for Linux☆1,029Updated last month
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆429Updated last month
- secator - the pentester's swiss knife☆1,218Updated this week
- Deep Linux runtime visibility meets Wireshark☆299Updated last month
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆991Updated last year
- A modular vulnerability scanner with automatic report generation capabilities.☆1,085Updated last week
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,381Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆433Updated last week
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆596Updated 2 months ago
- opkssh (OpenPubkey SSH)☆1,789Updated this week
- A minimal TLS 1.2 client implementation in a pure Bash script☆351Updated 2 years ago
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆712Updated 2 months ago
- SSH Session Monitoring Daemon☆525Updated 2 years ago
- Bitor Scanning Software☆439Updated last month
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 6 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆887Updated last week
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆972Updated 3 weeks ago
- 💀 Don't fear the Reaper 👻☆790Updated 2 weeks ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,235Updated last week
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆2,004Updated 2 months ago
- Passive hostname, domain and IP lookup tool for non-robots☆1,665Updated 3 weeks ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆386Updated last year
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆744Updated 4 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆191Updated 8 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 5 months ago
- ☆415Updated 3 weeks ago
- #supply #chain #attack #detection