95 skills found · Page 4 of 4
3nn10 / CloudDogCloudDog is a centralized EDR and WAF, it is able to identify and prevent web application attacks, ssh bruteforce and Suspicious shell commands.
Catium2006 / BaithookGet username and password dictionary from ssh brute-force attack.
ebrasha / Abdal SSH BruteForceAbdal SSH BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with ssh protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
Busindre / ViewDOSSimple shellscript to quickly generate an ordered list of all IPs connected to multiple servers in X ports, showing the amount of connections detailed with geolocation. It is intended to quickly get a report of suspicious IP addresses of several clusters under different types of DOS attacks. It just connects by SSH to different servers and uses netstat to obtain the desired information.
Chipsterjulien / Go Sshd AutobanA ssh autoban for fast and slow brute force attack written in go
infinition / Bjorn Chaos LabAutomated vulnerable machine deployer for penetration testing training and CTF challenges. Deploys Docker containers with multiple configurable attack surfaces over SSH, managed through a web UI with real-time feedback.
Iankulani / You Can Crack ItYou-Can-Crack-It is a next-generation cyber-security training tool designed to inspire upcoming ethical hackers. The system simulates brute-force attempts on port 22 (SSH) in a controlled, legal, and virtual environment, helping learners understand password-strength principles, attack patterns, and defensive countermeasures.
BlackBox-CSP / Ssh Timing AttackUsed to discover valid user names on systems that are vulnerable to timing attacks.
0xSojalSec / SsHbruteSmall golang program for ssh brute force attacks
rgrove / Denyssh:skull: Blocks SSH brute force attacks using PF. Unmaintained.
SmartData-Polito / HoneyclusterCan NLP tools support security experts for analysis on SSH exploits? An instrumental analysis to capture families of SSH attacks.
TobieTom / Ssh Honeypot Threat AnalysisMedium-interaction SSH honeypot for real-world attack pattern analysis and threat intelligence gathering
ozch / SSH Attack Detection Using Machine LearningFor Detection of SSH Attacks on Linux Machine, Read provided research paper for more details about methodology.
ChestnutSilver / Attack SSH Experiment同济大学信息安全综合实验设计大作业.(SSH攻击实验,2023)The homework of the course "Information Security Comprehensive Experiment Design" of Tongji University.
wincent / BanssheeAnti-SSH-attack tool
c0mentropy / SshcliSSH CLI - Asynchronous batch attack based on ssh connection
Midohajhouj / Brute ForcerA tool designed for ethical penetration testing and brute-force attacks on various services such as SSH, FTP, SMTP, and more.
SowmyaaRamesh / Brute Force SSH ServiceA python program to perform dictionary brute force attack on a system's ssh service using a password list
pmcao / CauditCAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks
abdelaziz-ouhammou / Brutedefa small tool for defending a server against ssh bruteforce attacks