AGWA / whoarethey
Determine Who Can Log In to an SSH Server
☆27Updated last year
Related projects ⓘ
Alternatives and complementary repositories for whoarethey
- Hostname filtering for arbitrary network protocols☆22Updated 2 weeks ago
- egrets monitors egress☆45Updated 4 years ago
- Command-line tool for rendering bar charts that can be displayed directly in the terminal or in text-based files like Markdown.☆18Updated 4 months ago
- ssh jump host appliance☆25Updated 2 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- The Jolly Executioner - a simple command execution proxy☆16Updated 5 months ago
- CloudFlare Worker Shell☆13Updated 4 years ago
- public DNS data yielder☆21Updated last year
- SOCKS for your subnet☆16Updated last year
- Some security by obscurity using port-jumping.☆14Updated 2 months ago
- like gofmt, but for jq☆51Updated 3 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆81Updated last month
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆94Updated 3 months ago
- ☆21Updated 2 months ago
- Provides an overview of the inner file structure of a PDF☆24Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 2 years ago
- AXFR all the things!☆23Updated 5 months ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 4 years ago
- ☆16Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 9 months ago
- Office 365 and Exchange domain federation enumeration tool☆13Updated last year