This penetration testing tool allows an auditor to intercept SSH connections by patching the OpenSSH source code to act as a proxy, logging plaintext passwords and sessions to disk. Note: Only run in a VM or container due to potential security vulnerabilities introduced by ad-hoc edits to critical regions of the OpenSSH sources.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.
SharpPrinter enables efficient discovery of network printers for security and management purposes.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A digital archive of the internet, allowing users to capture and browse archived web pages.
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.