SSHPry2.0
Terminal spy
A tool to remotely control and spy on an SSH-connected client's terminal session
SSHPry v2 - Spy & Control os SSH Connected client's TTY
397 stars
20 watching
78 forks
Language: Python
last commit: about 7 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
praetorian-inc/noseyparker | Find secrets and sensitive information in textual data | 1,693 |
scapy-unroot/scapy_unroot | Enables network packet manipulation without requiring root access | 8 |
cs01/termpair | A platform for secure terminal sharing over the web with real-time encryption and synchronization. | 1,609 |
taypo/redial | A shell application for managing SSH sessions on Unix systems. | 201 |
d4-project/passive-ssh | A tool for collecting and analyzing SSH key material for threat intelligence purposes. | 102 |
smaash/snitch | Automates information gathering via web search engines using predefined categories of dorks. | 373 |
sleventyeleven/linuxprivchecker | A tool for identifying potential vulnerability points in Linux systems | 1,569 |
kevthehermit/pastehunter | Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,065 |
wouterdebie/i2cssh | An iTerm2 plugin that enables multiple SSH connections to be managed and sent to separate terminals using a single command | 550 |
ml-tooling/ssh-proxy | A tool that allows users to securely access arbitrary containers via SSH while providing security features and full compatibility. | 80 |
hynekpetrak/sshame | A tool for brute-forcing SSH public-key authentication to test penetration testing and ethical hacking scenarios. | 75 |
traetox/sshforshits | A high-interaction SSH honeypot framework in Go that emulates limited shell functionality to attract and detect malicious actors | 39 |
ruthgnz/spyscrap | An OSINT tool that collects information from various online sources and uses facial recognition to filter results. | 169 |
victpork/sshsyrup | An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. | 96 |
buffer/thug | A tool designed to mimic the behavior of a user-driven network client application to detect and study malicious content. | 994 |