This penetration testing tool allows an auditor to intercept SSH connections by patching the OpenSSH source code to act as a proxy, logging plaintext passwords and sessions to disk. Note: Only run in a VM or container due to potential security vulnerabilities introduced by ad-hoc edits to critical regions of the OpenSSH sources.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems.
A blog post about bypassing AppLocker using PowerShell diagnostic scripts
A post-exploitation framework designed to operate covertly on heavily monitored environments.
A C2 profile generator for Cobalt Strike designed to enhance evasion.
A powerful tool for extracting passwords and performing various Windows security operations.
A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.
Collection of vulnerable ARM binaries for beginner vulnerability researchers & exploit developers.
A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.