Cookie04DE / Sekura
Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).
☆53Updated 3 years ago
Alternatives and similar repositories for Sekura:
Users that are interested in Sekura are comparing it to the libraries listed below
- An intuitive and encrypted in-memory filesystem (VFS)☆100Updated 2 years ago
- Analyse binaries for missing security features, information disclosure and more...☆86Updated last year
- ☆16Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Import and display Masscan data☆35Updated last week
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- A Passive SSH back-end and scanner.☆102Updated last month
- Tiny embeddable dns server☆46Updated last week
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- an interactive firewall for inbound and outbound connections☆63Updated last year
- ☆33Updated 4 years ago
- Hostname filtering for arbitrary network protocols☆22Updated 4 months ago
- E4's C2 server☆20Updated 4 years ago
- Implements io.ReaderAt over raw memory.☆13Updated 4 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆42Updated 4 years ago
- ☆18Updated 3 years ago
- SOCKS for your subnet☆17Updated last year
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 9 months ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆105Updated 7 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- trustor (PoC)☆25Updated 3 years ago
- Fuzz Network Traffic☆18Updated 3 months ago
- A web based drag and drop file transfer tool for sending files across the internet.☆22Updated 2 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated 2 months ago