Full SSH-2.0 Protocol in Pure x86_64 Assembly.
Complete SSH implementation — KEX, auth, encrypted transport, PTY, SFTP, port forwarding, pipe exec — ~94 KB static ELF, no libc.
Every byte handcrafted in NASM. No libc, no dynamic linking, no runtime. Complete SSH-2.0 with ChaCha20-Poly1305, Ed25519, SFTP, PTY, and port forwarding — all from scratch.
Full chacha20-poly1305@openssh.com transport. Two-key scheme, sequence-number nonce. Every packet authenticated.
Complete elliptic curve crypto from scratch. X25519 ECDH key exchange, Ed25519 host signatures, SHA-512 internals.
RFC 4253/4254: KEXINIT, ECDH, NEWKEYS, password auth, 8 multiplexed channels, window management.
SFTPv3 file transfers, interactive PTY shells, pipe-based exec, local and remote TCP port forwarding.
No libc, no dynamic linking. Pure Linux syscalls. 22 source files compile to one self-contained ELF.
Every crypto primitive and protocol feature tested. Python harnesses drive NASM test binaries via binary protocol.
Full SSH-2.0 key exchange with curve25519-sha256, Ed25519 host authentication, and ChaCha20-Poly1305 encrypted transport — every packet authenticated and encrypted after NEWKEYS.
[Operator] [Target] OpenSSH ──────── TCP ────────> depth (bind) <── ──── ── KEXINIT ───────────> <── KEXINIT ────────── ── ECDH_INIT ─────────> <── ECDH_REPLY ─────── (Ed25519 signed) ═══ encrypted ═══════> <═══ encrypted ═══════
| Transport | Raw TCP via syscall |
| Encryption | chacha20-poly1305@openssh.com |
| Key Exchange | curve25519-sha256 |
| Host Auth | ssh-ed25519 |
| User Auth | Password (ssh-userauth) |
| Channels | 8 multiplexed with window mgmt |
| Shell | PTY + pipe-based exec |
| SFTP | SFTPv3, 16 handles |
| Forwarding | Local + remote TCP |
What makes Depth tick — every component implemented from scratch in assembly.
Clone, build, run. Connect with any standard SSH client — OpenSSH, PuTTY, or libssh.