Originally I wanted to build a regreSHHion scanner and exploiter. I then added additional CVEs to it. If anyone can help me expand parts of the project, please get in touch.
WELCOME TO NOREGRESSH
Norregressh is a penetration-testing framework focused on OpenSSH regressions and multiple CVEs. It includes discovery, targeted exploitation workflows, listener management and post-exploit helpers, systemmonitor shows ips, checks if ports are open, listener-helper,
Use only with explicit authorization.
Happy Hacking! coded with ai by me.
# Clone the repo
git clone https://github.com/OhDamnn/Noregressh.git
cd Noregressh
# Automatic setup (recommended)
sudo python3 setup.py
# Or manual install with
git clone https://github.com/OhDamnn/Noregressh/
chmod +x *.py
pip install -r requirements.txt
python3 no_regresh_launcher.py
If the launcher is not executable:
chmod +x no_regresh_launcher.py
-
CVE-2024-6387 — Remote Code Execution (regreSSHion)
-
CVE-2020-14145 — Username enumeration via timing
-
CVE-2021-28041 — Username enumeration via response timing
-
CVE-2019-16905 — Username enumeration via error messages
-
CVE-2018-15473 — Username enumeration via response differences
-
OpenSSH 8.5 – 9.7 (CVE-2024-6387)
-
OpenSSH 8.2 – 8.3 (CVE-2021-28041)
-
OpenSSH 7.4 – 7.5 (CVE-2020-14145)
-
OpenSSH 7.9 – 8.0 (CVE-2019-16905)
-
OpenSSH 7.7 – 7.8 (CVE-2018-15473)
- Multi-threaded network scanner with CSV export.
- Automatic CVE detection and targeted exploitation flows.
- Flexible payloads: reverse shells, bind shells, web shells, base64 variants.
- Listener manager with Python listener, Netcat/Socat fallback, multi-listener support.
- File transfer, screenshot capture, basic keylogger.
- System checks: IP reachability, firewall detection, dependency auto-install.
- Structured JSON reports and detailed logs.
- Thread-safe design and improved error handling.
- Authorized testing only. Illegal use is the user's responsibility.
- The tool does not add new exploits beyond the included CVE checks.
- Review and audit code before running in any environment.
- Add a license and supply explicit scope and authorization before any engagement.
- If setup fails, install dependencies manually:
pip install -r requirements.txt
. - If permissions block execution:
chmod +x no_regresh_launcher.py
. - For environment errors on some distros, use a virtualenv.
- Python 3.x
- OS/network tools available on typical pentest workstations
- Run with appropriate permissions for installed dependencies
LOGS:

Open an issue or submit a PR. Keep changes focused, documented, and reversible. Include tests when adding detection or exploit code.
Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
Copyright (c) 2025 OhDamn
This work is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License. You are free to:
• Share — copy and redistribute the material in any medium or format • Adapt — remix, transform, and build upon the material
Under the following terms:
• Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. • NonCommercial — You may not use the material for commercial purposes.
For the full license text, see: https://creativecommons.org/licenses/by-nc/4.0/
SPDX-License-Identifier: CC-BY-NC-4.0