Visit Website

This penetration testing tool allows an auditor to intercept SSH connections by patching the OpenSSH source code to act as a proxy, logging plaintext passwords and sessions to disk. Note: Only run in a VM or container due to potential security vulnerabilities introduced by ad-hoc edits to critical regions of the OpenSSH sources.

ALTERNATIVES