sshLooter
Tool and Usage
Project details
- Programming languages
- Python, shell script
- Author
- Matheus Bernardes
- Latest release
- No release found
- Latest release date
- Unknown
Project health
Links
GitHub project |
Why this tool?
The most likely use for tools like this is backdoor a system after root permissions were gained. By planting it into the PAM stack, it allows for password sniffing.
Usage and audience
sshLooter is commonly used for information snooping, password discovery, or password sniffing. Target users for this tool are pentesters and security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + The source code is easy to read and understand
Weaknesses
- - Unknown project license
Installation
Supported operating systems
SshLooter is known to work on Linux.
sshLooter alternatives
Similar tools to sshLooter:
Bucket Stream
Bucket Stream is a security tool to find interesting Amazon S3 Buckets by watching certificate transparency logs. See our review and learn how it works.
LaZagne
The LaZagne project is an open source tool to retrieve passwords stored on a local system. It uses different techniques to obtain passwords from well-known applications.
ClamAV
ClamAV is an open source antivirus engine. It can detect malicious software (malware) like trojans, viruses, backdoors and other related threats.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a PAM backdoor and password sniffing tool.