SSHamble: Unexpected Exposures in SSH
☆1,181Apr 28, 2026Updated this week
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆876Feb 3, 2024Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- ☆61Oct 24, 2024Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆433Apr 1, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆349Mar 21, 2026Updated last month
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,278Apr 23, 2026Updated last week
- Group Policy Objects manipulation and exploitation framework☆304Dec 7, 2025Updated 4 months ago
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆619Updated this week
- Automating situational awareness for cloud penetration tests.☆2,363Apr 21, 2026Updated last week
- A Mythic Agent written in PIC C.☆204Feb 4, 2025Updated last year
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated 3 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆272Nov 12, 2024Updated last year
- Threat-hunting tool for Linux☆1,057Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Open Adversarial Exposure Validation Platform☆1,670Apr 25, 2026Updated last week
- secator - the pentester's swiss knife☆1,279Updated this week
- A tool to transform Chromium browsers into a C2 Implant☆576Dec 17, 2025Updated 4 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆815Sep 3, 2024Updated last year
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆444Updated this week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,268Mar 19, 2025Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆285Sep 26, 2024Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆192Sep 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Direct access to NTFS volumes☆295Sep 9, 2025Updated 7 months ago
- An offensive data enrichment pipeline☆956Apr 14, 2026Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆85Dec 4, 2024Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,470Updated this week
- DPAPI looting remotely and locally in Python☆549Mar 13, 2026Updated last month
- Open-source security automation platform for teams and AI agents☆3,563Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆862Feb 25, 2026Updated 2 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,024Jan 7, 2026Updated 3 months ago
- Bitor Scanning Software☆459Nov 7, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,322Mar 25, 2026Updated last month
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆269Nov 22, 2025Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆144Apr 11, 2026Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆517Aug 7, 2024Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆562Oct 3, 2025Updated 6 months ago