Originally I wanted to build a regreSHHion scanner and exploiter. I then added additional CVEs to it. If anyone can help me expand parts of the project, please get in touch.
WELCOME TO NOREGRESSH
Norregressh is a penetration-testing framework focused on OpenSSH regressions and multiple CVEs. It includes discovery, targeted exploitation workflows, listener management and post-exploit helpers, systemmonitor shows ips, checks if ports are open, listener-helper,
Use only with explicit authorization.
Happy Hacking! coded with ai by me.
# Clone the repo
git clone https://github.com/OhDamnn/Noregressh.git
cd Noregressh
# Automatic setup (recommended)
sudo python3 setup.py# Or manual install with
git clone https://github.com/OhDamnn/Noregressh/
chmod +x *.py
pip install -r requirements.txt
python3 no_regresh_launcher.pyIf the launcher is not executable:
chmod +x no_regresh_launcher.py- 
CVE-2024-6387 — Remote Code Execution (regreSSHion)
 - 
CVE-2020-14145 — Username enumeration via timing
 - 
CVE-2021-28041 — Username enumeration via response timing
 - 
CVE-2019-16905 — Username enumeration via error messages
 - 
CVE-2018-15473 — Username enumeration via response differences
 - 
OpenSSH 8.5 – 9.7 (CVE-2024-6387)
 - 
OpenSSH 8.2 – 8.3 (CVE-2021-28041)
 - 
OpenSSH 7.4 – 7.5 (CVE-2020-14145)
 - 
OpenSSH 7.9 – 8.0 (CVE-2019-16905)
 - 
OpenSSH 7.7 – 7.8 (CVE-2018-15473)
 
- Multi-threaded network scanner with CSV export.
 - Automatic CVE detection and targeted exploitation flows.
 - Flexible payloads: reverse shells, bind shells, web shells, base64 variants.
 - Listener manager with Python listener, Netcat/Socat fallback, multi-listener support.
 - File transfer, screenshot capture, basic keylogger.
 - System checks: IP reachability, firewall detection, dependency auto-install.
 - Structured JSON reports and detailed logs.
 - Thread-safe design and improved error handling.
 
- Authorized testing only. Illegal use is the user's responsibility.
 - The tool does not add new exploits beyond the included CVE checks.
 - Review and audit code before running in any environment.
 - Add a license and supply explicit scope and authorization before any engagement.
 
- If setup fails, install dependencies manually: 
pip install -r requirements.txt. - If permissions block execution: 
chmod +x no_regresh_launcher.py. - For environment errors on some distros, use a virtualenv.
 
- Python 3.x
 - OS/network tools available on typical pentest workstations
 - Run with appropriate permissions for installed dependencies
 
LOGS:
Open an issue or submit a PR. Keep changes focused, documented, and reversible. Include tests when adding detection or exploit code.
Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
Copyright (c) 2025 OhDamn
This work is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License. You are free to:
• Share — copy and redistribute the material in any medium or format • Adapt — remix, transform, and build upon the material
Under the following terms:
• Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. • NonCommercial — You may not use the material for commercial purposes.
For the full license text, see: https://creativecommons.org/licenses/by-nc/4.0/
SPDX-License-Identifier: CC-BY-NC-4.0

