SSHamble: Unexpected Exposures in SSH
☆1,175Feb 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆862Feb 3, 2024Updated 2 years ago
- Tools for interacting with authentication packages using their individual message protocols☆403Feb 1, 2026Updated last month
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆598Updated this week
- Group Policy Objects manipulation and exploitation framework☆292Dec 7, 2025Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- Automating situational awareness for cloud penetration tests.☆2,295Feb 21, 2026Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated last month
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- A tool to transform Chromium browsers into a C2 Implant☆555Dec 17, 2025Updated 2 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- An offensive data enrichment pipeline☆919Updated this week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,258Mar 19, 2025Updated 11 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Sep 8, 2024Updated last year
- Open Adversarial Exposure Validation Platform☆1,629Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,372Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- DPAPI looting remotely and locally in Python☆541Oct 7, 2025Updated 4 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆809Sep 3, 2024Updated last year
- Deep Linux runtime visibility meets Wireshark☆304Nov 13, 2025Updated 3 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- Threat-hunting tool for Linux☆1,043Feb 16, 2026Updated 2 weeks ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,303Updated this week
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- The open source AI platform for secure enterprise agents.☆3,497Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Live validation proxy tool for testing web app vulnerabilities☆831Feb 14, 2026Updated 2 weeks ago
- ☆59Oct 24, 2024Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆436Updated this week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,308Jul 27, 2025Updated 7 months ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆433Feb 5, 2026Updated 3 weeks ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,253Jul 22, 2025Updated 7 months ago
- A collaborative, multi-platform, red teaming framework☆4,318Feb 19, 2026Updated last week
- Zero shot vulnerability discovery using LLMs☆2,506Feb 6, 2025Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated last month
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,230Aug 18, 2023Updated 2 years ago
- The Network Execution Tool☆5,279Feb 23, 2026Updated last week