Tool and Usage
|Programming languages||Python, shell script|
|Latest release||No release found|
Why this tool?
The most likely use for tools like this is backdoor a system after root permissions were gained. By planting it into the PAM stack, it allows for password sniffing.
Usage and audience
sshLooter is commonly used for information snooping, password discovery, or password sniffing. Target users for this tool are pentesters and security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code is easy to read and understand
- - Unknown project license
Supported operating systems
SshLooter is known to work on Linux.
Similar tools to sshLooter:
Bucket Stream is a security tool to find interesting Amazon S3 Buckets by watching certificate transparency logs. See our review and learn how it works.
The LaZagne project is an open source tool to retrieve passwords stored on a local system. It uses different techniques to obtain passwords from well-known applications.
chkrootkit is a malware scanner to locally check for signs of a rootkit. It is written in shell script and runs on the host system itself.
Found an improvement? Help the community by submitting an update.