🔧 SSHCracker v3.0-beta (Development) v3.0-dev-20260103-132830
·
0 commits
to main
since this release
🚀 SSHCracker v3.0-beta - Advanced SSH Brute Force Tool
🆕 What's New in v3.0-beta:
- 🎯 Advanced Honeypot Detection - 11 sophisticated algorithms (was 9)
- 📊 Dynamic Threshold - Smart threshold calculation based on test results
- ⏸️ Pause/Resume - Press Ctrl+C to pause, use
--resumeto continue - 💾 Auto-save - State saved every 5 minutes automatically
- 🎨 Professional UI - Interactive prompts with validation (promptui)
- 🏳️ CLI Flags -
--resume,--resume-file,--help - ⏱️ Command Timing Analysis - CV-based timing for honeypot detection
- 🔍 SSH Banner Fingerprinting - Detect honeypot SSH versions
- 📘 WIKI Documentation - Comprehensive English guide
Release Type: automatic
Build Date: 2026-01-03 13:28:30 UTC
Triggered by: push
Developer: SudoLite (@SudoLite)
✨ Core Features:
- 🍯 Advanced Honeypot Detection - 11 algorithms with dynamic threshold
- ⏸️ Pause/Resume - Masscan-style Ctrl+C pause with state persistence
- 💾 Auto-save - Never lose progress with 5-minute auto-save
- 📊 Real-time Dashboard - Live progress with aligned UI boxes
- 🔍 Deep Reconnaissance - Comprehensive server information gathering
- 🚀 Multi-platform - Linux, Windows, macOS compatibility
- ⚡ High Performance - Multi-layer concurrent worker architecture
- 🛡️ Open Source - Completely free, no license required
🎯 Honeypot Detection Algorithms (11):
| # | Algorithm | Description |
|---|---|---|
| 1 | Command Timing | CV-based response time analysis |
| 2 | SSH Banner | Known honeypot version fingerprinting |
| 3 | Filesystem | Suspicious paths and fake structures |
| 4 | Network Ports | Unusual open port patterns |
| 5 | System Info | Fake hostname/OS detection |
| 6 | User Enumeration | Invalid user behavior analysis |
| 7 | Process List | Missing/fake process detection |
| 8 | Command Response | Honeypot signature matching |
| 9 | Connection Behavior | Unusual connection patterns |
| 10 | Time Consistency | Command timing anomalies |
| 11 | Environment | Suspicious environment variables |
📱 Community:
- 🌐 English Community: @MatrixORG
- 🇮🇷 Persian Community: @MatrixFa
- 💬 Chat Group: @DD0SChat
📦 Available Downloads:
| Platform | Architecture | File |
|---|---|---|
| 🐧 Linux | AMD64 | sshcracker-v3.0-linux-amd64 |
| 🐧 Linux | ARM64 | sshcracker-v3.0-linux-arm64 |
| 🪟 Windows | AMD64 | sshcracker-v3.0-windows-amd64.exe |
| 🍎 macOS | Intel | sshcracker-v3.0-darwin-amd64 |
| 🍎 macOS | Apple Silicon | sshcracker-v3.0-darwin-arm64 |
🛠️ Quick Start:
# Download and make executable
chmod +x sshcracker-v3.0-linux-amd64
# Run interactive mode
./sshcracker-v3.0-linux-amd64
# Show help
./sshcracker-v3.0-linux-amd64 --help
# Resume paused scan
./sshcracker-v3.0-linux-amd64 --resume📖 Documentation:
⚠️ Legal & Ethical Use:
This tool is designed for authorized penetration testing, educational purposes,
and security research only. Always ensure you have explicit permission before
testing any systems you do not own.
Full Changelog: Major update with 11 honeypot algorithms, pause/resume, auto-save, and professional UI