95 skills found · Page 3 of 4
ExploitXpErtz / BruteXsshBruteXssh is an advanced GUI-based SSH cracker powered by Python libraries. It employs parallel processing, supports mass target selection, allows custom thread levels, and offers proxy functionality to enhance SSH cracking efficiency.
seanschoi / Mininet SshmitmThis is an example of SSH Man in the Middle (MITM) attack using Mininet and Ettercap
omer-efe-curkus / CVE 2025 32433 Erlang OTP SSH RCE PoCThe vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication.
whxitte / HoneypotA vulnerable honeypot setup using Flask and SSH to capture and analyze malicious activities. Includes real-time logging and monitoring to study attack patterns and exploit attempts
usethisname1419 / COREXITAL MULTITOOLHacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation
offensive-terraform / Terraform Aws Ebs Snapshot Publicly ExposedOffensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
kura / Ssh Attack VisualisationNo description available
hlts2 / CrsshSSH password crack for penetration tests using brute force and dictionary attacks.
ashishps1 / Clustering SSH AttacksNo description available
honeynet / EventHorizonEventHorizon is an open-source multiprotocol IoT tarpit framework designed to emulate commonly abused IoT services such as Telnet, SSH, MQTT, UPnP, and CoAP in order to trap and study automated attackers.
apauna / RASSHRASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with the attackers by allowing/blocking/delaying/substituting their commands or insulting them. For the RL implementation the project uses PyBrain a modular Machine Learning Library for Python.
aldenso / SshgobruteSmall golang program for ssh brute force attacks
stratosphereips / AracneA 100% autonomous AI agent that attacks, defends, admins and acts on SSH connections
s-r-e-e-r-a-j / SSHBusterSSHBuster is a powerful command-line SSH brute-forcing tool designed for ethical hacking and penetration testing. It performs dictionary-based attacks to find valid SSH login credentials efficiently.
tola24234 / Mini SiemMini Security Information and Event Management (SIEM) system that collects Linux authentication logs, detects brute-force SSH attacks, and generates alerts.
xcodeOn1 / SSH KILLv2Attack ssh in IOS phone
SecDev0ps / SSH Terrapin AttackNo description available
Did-Dog / DogeWorkFlowGithub Actions as [RDP, Android APK Builder, DDOS Attack, Terminal SSh]
unixfreaxjp / Strudels AttackIOC for "Strudel"IoT "SSH TCP Forward" attacks | https://unixfreaxjp.github.io/Strudels_Attack/
Cryptix720 / HUDINXHudinx is a tiny interaction SSH honeypot engineered in Python to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.