SSH Penetration Testing
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This document is an operational SSH penetration-testing playbook containing explicit, actionable offensive techniques: automated brute-force, credential harvesting, persistence (authorized_keys), reverse tunnels, pivoting via SOCKS, and evasion methods. It does not contain hidden network callbacks or obfuscated malware, but it materially enables unauthorized compromise if used without permission. Treat as high security risk in public/distributed form; acceptable only for authorized testing within controlled environments with legal approval and logging. LLM verification: This skill is an explicit SSH penetration-testing guide that contains high-risk offensive techniques: credential harvesting examples, brute-force workflows, and reverse forwarding (callback) patterns. The capabilities are consistent with the stated purpose, but they enable actions that can be malicious if used without authorization. There is no evidence of hidden or obfuscated malware in the provided text, but the instructions pose a substantial security risk if executed by an agent without stri