Cookie04DE / SekuraLinks
Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).
☆52Updated 4 years ago
Alternatives and similar repositories for Sekura
Users that are interested in Sekura are comparing it to the libraries listed below
Sorting:
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- ☆16Updated 5 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆101Updated last week
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆111Updated last year
- GO sandbox to run untrusted code☆42Updated 5 years ago
- Hostname filtering for arbitrary network protocols☆24Updated this week
- find historical account IDs for specified twitter @ name using wayback machine captures☆24Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- ☆33Updated 5 years ago
- Provides access to libhashcat☆31Updated last year
- ☆11Updated 3 years ago
- Package pwnedpass is a Go package for querying a local instance of Troy Hunt's Pwned Passwords database.☆15Updated 2 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- CLI tool for PKCS7 padding oracle attacks☆141Updated 4 years ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆34Updated last year
- Grep Web pages with extra features like JS deobfuscation and OCR☆114Updated last year
- Shellcode process injector☆28Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 6 years ago
- Utility to find hidden Linux kernel modules☆146Updated 3 months ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 8 months ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- Network Traffic Fuzzer☆18Updated 10 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- AXFR all the things!☆27Updated last month
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago