SSH wrapper for red team operations — drop-in replacement with superpowers.
Wraps the real ssh binary via PTY, intercepting ! commands for tunnel management, file transfers, passive filesystem mapping, and per-command session logging. All SSH functionality passes through unchanged.
Authorization Required: Designed exclusively for authorized security testing with explicit written permission.
Prerequisites: Rust 1.70+, OpenSSH 6.8+ (client)
git clone https://github.com/Real-Fruit-Snacks/Slipstream.git
cd Slipstream
cargo build --releaseVerify:
./target/release/slipstream ssh user@10.10.10.5iptables-style syntax for SSH tunnels. Real forwarding via ssh -O forward over the master socket.
!tunnel add --type socks -p 1080 # SOCKS proxy
!tunnel add --type local -s 8080 -d 10.10.10.50 -p 80 # local forward
!tunnel add --type reverse -s 9090 -d 127.0.0.1 -p 4444 # reverse forward
!tunnel list # show active
!tunnel save # persist configAutomatic fallback chain: SFTP → SCP → cat-over-SSH → base64. Windows paths handled transparently.
!upload linpeas.sh /tmp/ # upload file
!download /etc/shadow ./loot/ # download file
!upload --method scp tool.bin /opt/ # force specific methodPassive output parsing — watches your commands and builds a searchable map without sending extra traffic.
!map # show mapped filesystem tree
!map find *.conf # search by pattern
!map find suid # find SUID binaries
!map users # show discovered users
!map export # export as JSONEvery command gets its own timestamped log file. Built for OSCP exam proof and engagement reporting.
!sessions # list active sessions
!note This is the DC # annotate the target
!loot # auto-grab common recon files
!exec whoami # run command via control socketTargets identified by SSH host key fingerprint, not IP. Handles DHCP changes, dual-homed hosts, and lab IP reuse. Conflict detection prompts: Archive, Keep, or Ignore.
Auto-detects Linux vs Windows from SSH output. Adapts mapper parsers, CWD tracking, transfer paths, and loot targets per platform.
src/
├── main.rs # Entry point, PTY spawn
├── ssh/ # Binary discovery, args, fingerprint, master socket
├── input/ # Prompt-aware interception, cooked/raw mode
├── tunnel/ # CRUD + SSH forward execution
├── transfer/ # SFTP/SCP/cat/base64 fallback chain
├── mapper/ # Output parsers, store, query, CWD tracking
├── logging/ # Per-command logs, boundary detection
├── session/ # Session lifecycle management
└── target/ # Fingerprint identity, conflict resolution
PTY-based interception model. In cooked mode, buffers input and checks for !<known_command>. Unknown ! sequences pass through for bash history expansion. In raw mode (vim, top, tmux), all input passes through unmodified.
~6,400 lines of Rust. 38 source files. 118 tests. 2.4 MB binary.
| Linux Attacker | Windows Target | Linux Target | |
|---|---|---|---|
| SSH Wrapping | Full | N/A | N/A |
| Tunnels | Full | Full | Full |
| File Transfer | Full | Full (path conversion) | Full |
| Mapper | ls, find, /etc/passwd | dir, net user, ipconfig | ls, find, /etc/passwd |
| Logging | Full | Full | Full |
Report vulnerabilities via GitHub Security Advisories. 90-day responsible disclosure.
Slipstream does not:
- Modify SSH traffic or inject commands into the session
- Store credentials (uses the system's ssh binary and keys)
- Bypass SSH authentication or encryption
- Operate without a real SSH connection to the target
MIT — Copyright 2026 Real-Fruit-Snacks