95 skills found · Page 2 of 4
msimerson / SentryBruteforce attack blocker (ssh, FTP, SMTP, and more)
R0ckNRolla / BruteDumBruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
vimers01 / Deny Ssh Password AttackOpenwrt 自身没有对抗ssh破解的工具,为了暴露在互联网的路由器更加安全,基于iptables编写了一个小脚本, 脚本通过crontab定时执行,
NetWatch-team / SSH AttackPodThe NetWatch SSH-AttackPod is a modified OpenSSH server that records any attempted username/password combinations along with the source IP and reports it to the NetWatch back end
iBug / FakesshA fake SSH tarpit that logs passwords and commands from attackers
BlackHoleMonster / IP BlackHoleIP.blackhole is an IP blacklist that uses multiple sensors to identify network attacks (e.g. SSH brute force) and spam incidents. All reports are evaluated and in case of too many incidents the responsible IP holder is informed to solve the problem.
Sodium-Hydrogen / SSH Attack StatsA simple script that will run in MOTD on a linux server and will tell you the attack statistics
matricali / BrutekragPenetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
ludovicianul / GeologGeolocation for SSH brute force attacks
CrzPhil / SSHniffAn SSH metadata analyser used to showcase a timing-based attack on the protocol.
CyberNDR / ScanExpScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the FTP protocol, port 22 for the SSH protocol and port 25 for the SMTP protocol, providing the choice between the use of two different wordlists for the username and password or two personalized wordlists chosen by the user.
martian56 / VenxWifi cracking, pentesting tool. Pre-connection and Post-connection attacks. Capturing handshakes and cracking existing handshakes. ssh Bruteforce and other usefull features
JaviMJ / OCTOPUSThis project is a ssh botnet with web panel that offers a few functionalities like network scan, brute force and ddos attacks, send files, execute of python scripts, etc.
abhishekpatel-lpu / CICIDS 2017 Intrution Detection Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated and ever-growing network attacks. Due to the lack of reliable test and validation datasets, anomaly-based intrusion detection approaches are suffering from consistent and accurate performance evolutions. Our evaluations of the existing eleven datasets since 1998 show that most are out of date and unreliable. Some of these datasets suffer from the lack of traffic diversity and volumes, some do not cover the variety of known attacks, while others anonymize packet payload data, which cannot reflect the current trends. Some are also lacking feature set and metadata. CICIDS2017 dataset contains benign and the most up-to-date common attacks, which resembles the true real-world data (PCAPs). It also includes the results of the network traffic analysis using CICFlowMeter with labeled flows based on the time stamp, source, and destination IPs, source and destination ports, protocols and attack (CSV files). Also available is the extracted features definition. Generating realistic background traffic was our top priority in building this dataset. We have used our proposed B-Profile system (Sharafaldin, et al. 2016) to profile the abstract behavior of human interactions and generates naturalistic benign background traffic. For this dataset, we built the abstract behaviour of 25 users based on the HTTP, HTTPS, FTP, SSH, and email protocols. The data capturing period started at 9 a.m., Monday, July 3, 2017 and ended at 5 p.m. on Friday July 7, 2017, for a total of 5 days. Monday is the normal day and only includes the benign traffic. The implemented attacks include Brute Force FTP, Brute Force SSH, DoS, Heartbleed, Web Attack, Infiltration, Botnet and DDoS. They have been executed both morning and afternoon on Tuesday, Wednesday, Thursday and Friday.
robzr / DropBruteLightweight fail2ban alternative for OpenWRT - inspects ssh log for brute force attacks and blocks via iptables - w/ whitelist and blacklist support
MrMugiwara / Against Crackeragainst.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
dgerzo / BruteforceblockerBruteForceBlocker is a perl script, that works along with pf firewall. Its main purpose is to block SSH bruteforce attacks via firewall.
tanhiowyatt / Cyanide HoneypotCyanide is an advanced open-source honeypot framework for cybersecurity. It emulates SSH/Telnet to lure attackers and analyze their tactics.
norksec / TorcrackA simple Tor enabled, multi-process SSH dictionary attack in Python3.
agentic-dev3o / Sandbox ShellmacOS Seatbelt sandbox CLI for developers. Protect credentials (SSH, AWS, GPG) from malicious npm packages, supply chain attacks, and untrusted build scripts. Deny-by-default filesystem isolation. Perfect for Claude Code agentic workflows with --dangerously-skip-permissions.