runZeroInc / sshambleLinks
SSHamble: Unexpected Exposures in SSH
☆1,173Updated last week
Alternatives and similar repositories for sshamble
Users that are interested in sshamble are comparing it to the libraries listed below
Sorting:
- Threat-hunting tool for Linux☆1,033Updated last week
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆432Updated this week
- Deep Linux runtime visibility meets Wireshark☆302Updated 2 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,299Updated 6 months ago
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆718Updated 3 months ago
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,402Updated this week
- Passive hostname, domain and IP lookup tool for non-robots☆1,773Updated 2 months ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆992Updated last year
- secator - the pentester's swiss knife☆1,234Updated last week
- Bitor Scanning Software☆454Updated 3 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆977Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆1,114Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated this week
- #supply #chain #attack #detection☆642Updated this week
- SSH Session Monitoring Daemon☆525Updated this week
- CI/CD Security Analyzer☆729Updated 11 months ago
- Pen Test Report Generation and Assessment Collaboration☆589Updated 2 weeks ago
- opkssh (OpenPubkey SSH)☆1,822Updated this week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆721Updated last month
- A minimal TLS 1.2 client implementation in a pure Bash script☆351Updated 2 years ago
- io_uring based rootkit☆249Updated 9 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆190Updated last year
- Zaps arguments and environment from the process list☆241Updated last year
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆454Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆601Updated 3 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆233Updated 7 months ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆384Updated last year
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆1,339Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆508Updated 2 weeks ago
- A repo to conduct vulnerability enrichment.☆718Updated this week