Skip to content

🔧 SSHCracker v3.0-beta (Development) v3.0-dev-20260103-132830

Choose a tag to compare

@github-actions github-actions released this 03 Jan 13:28
· 0 commits to main since this release

🚀 SSHCracker v3.0-beta - Advanced SSH Brute Force Tool

🆕 What's New in v3.0-beta:

  • 🎯 Advanced Honeypot Detection - 11 sophisticated algorithms (was 9)
  • 📊 Dynamic Threshold - Smart threshold calculation based on test results
  • ⏸️ Pause/Resume - Press Ctrl+C to pause, use --resume to continue
  • 💾 Auto-save - State saved every 5 minutes automatically
  • 🎨 Professional UI - Interactive prompts with validation (promptui)
  • 🏳️ CLI Flags - --resume, --resume-file, --help
  • ⏱️ Command Timing Analysis - CV-based timing for honeypot detection
  • 🔍 SSH Banner Fingerprinting - Detect honeypot SSH versions
  • 📘 WIKI Documentation - Comprehensive English guide

Release Type: automatic
Build Date: 2026-01-03 13:28:30 UTC
Triggered by: push
Developer: SudoLite (@SudoLite)

✨ Core Features:

  • 🍯 Advanced Honeypot Detection - 11 algorithms with dynamic threshold
  • ⏸️ Pause/Resume - Masscan-style Ctrl+C pause with state persistence
  • 💾 Auto-save - Never lose progress with 5-minute auto-save
  • 📊 Real-time Dashboard - Live progress with aligned UI boxes
  • 🔍 Deep Reconnaissance - Comprehensive server information gathering
  • 🚀 Multi-platform - Linux, Windows, macOS compatibility
  • High Performance - Multi-layer concurrent worker architecture
  • 🛡️ Open Source - Completely free, no license required

🎯 Honeypot Detection Algorithms (11):

# Algorithm Description
1 Command Timing CV-based response time analysis
2 SSH Banner Known honeypot version fingerprinting
3 Filesystem Suspicious paths and fake structures
4 Network Ports Unusual open port patterns
5 System Info Fake hostname/OS detection
6 User Enumeration Invalid user behavior analysis
7 Process List Missing/fake process detection
8 Command Response Honeypot signature matching
9 Connection Behavior Unusual connection patterns
10 Time Consistency Command timing anomalies
11 Environment Suspicious environment variables

📱 Community:

📦 Available Downloads:

Platform Architecture File
🐧 Linux AMD64 sshcracker-v3.0-linux-amd64
🐧 Linux ARM64 sshcracker-v3.0-linux-arm64
🪟 Windows AMD64 sshcracker-v3.0-windows-amd64.exe
🍎 macOS Intel sshcracker-v3.0-darwin-amd64
🍎 macOS Apple Silicon sshcracker-v3.0-darwin-arm64

🛠️ Quick Start:

# Download and make executable
chmod +x sshcracker-v3.0-linux-amd64

# Run interactive mode
./sshcracker-v3.0-linux-amd64

# Show help
./sshcracker-v3.0-linux-amd64 --help

# Resume paused scan
./sshcracker-v3.0-linux-amd64 --resume

📖 Documentation:

⚠️ Legal & Ethical Use:

This tool is designed for authorized penetration testing, educational purposes,
and security research only. Always ensure you have explicit permission before
testing any systems you do not own.


Full Changelog: Major update with 11 honeypot algorithms, pause/resume, auto-save, and professional UI