runZeroInc / sshambleLinks
SSHamble: Unexpected Exposures in SSH
☆1,141Updated last week
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,244Updated last month
- Threat-hunting tool for Linux☆973Updated 3 weeks ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆402Updated last month
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,287Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆932Updated this week
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆983Updated last year
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆933Updated last week
- Deep Linux runtime visibility meets Wireshark☆294Updated last month
- opkssh (OpenPubkey SSH)☆1,659Updated last week
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆687Updated 4 months ago
- 💀 Don't fear the Reaper 👻☆590Updated last week
- A minimal TLS 1.2 client implementation in a pure Bash script☆353Updated last year
- secator - the pentester's swiss knife☆1,141Updated last week
- Bitor Scanning Software☆406Updated last month
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆226Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆412Updated this week
- Pen Test Report Generation and Assessment Collaboration☆563Updated 2 weeks ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆380Updated last year
- Passive hostname, domain and IP lookup tool for non-robots☆1,620Updated last week
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,531Updated last year
- Simple Wireguard 2FA☆638Updated this week
- A complete terminal user interface (TUI) for LDAP.☆785Updated 2 weeks ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆585Updated last month
- #supply #chain #attack #detection☆550Updated this week
- Searches through git repositories for high entropy strings and secrets, digging deep into commit history☆507Updated 3 months ago
- Tunnel TCP connections through a file☆955Updated last week
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- RouterOS Security Inspector☆261Updated last month
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,094Updated last week
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 5 months ago