Linux/Unix Security Auditing Scripts: Lusas
☆23Jun 27, 2017Updated 8 years ago
Alternatives and similar repositories for lusas
Users that are interested in lusas are comparing it to the libraries listed below
Sorting:
- ☆12Jan 7, 2020Updated 6 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- ☆33May 23, 2014Updated 11 years ago
- MFT and USN parser that allows direct extraction in filesystem timeline format (mactime), dump all resident files in the MFT in their ori…☆13May 10, 2023Updated 2 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Jun 23, 2021Updated 4 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29May 7, 2017Updated 8 years ago
- Software for Xmega-A1 Xplained board with MAX4619 glitch circuit☆42Jan 27, 2017Updated 9 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Create lighthouse reports for multiple sites☆37Nov 15, 2018Updated 7 years ago
- Generate SRI hashes in gulp☆15Nov 9, 2017Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Git repository to browse the XNU releases from☆10Sep 20, 2021Updated 4 years ago
- Offline tool for recovering NEM private keys from BIP39 mnemonics and importing them into NanoWallet☆13Jan 15, 2018Updated 8 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Python port of UMSKT☆12May 5, 2024Updated last year
- Tool Desgined to remove unwanted apps from Xioami Devices.☆13Oct 22, 2023Updated 2 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- ☆10Nov 29, 2019Updated 6 years ago