Aralhach / bashobfusLinks
A small bash minifier/obfuscator written in Perl.
☆54Updated 10 years ago
Alternatives and similar repositories for bashobfus
Users that are interested in bashobfus are comparing it to the libraries listed below
Sorting:
- Detect snooper on your system!☆85Updated 8 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Blockfinder enumerates network information for countries☆131Updated 3 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 10 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- SSH connection daemon for Debian/Raspbian/Ubuntu/etc☆128Updated 2 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Updated 6 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 7 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- ☆16Updated 9 years ago
- Bruteforce attack blocker (ssh, FTP, SMTP, and more)☆64Updated 4 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- TOR Mail encrypted server for Hidden Services☆44Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Removed according to regulations☆35Updated 8 years ago