Improved OpenVPN installer for Debian, Ubuntu, CentOS and Arch Linux
☆10Feb 23, 2017Updated 9 years ago
Alternatives and similar repositories for OpenVPN-install
Users that are interested in OpenVPN-install are comparing it to the libraries listed below
Sorting:
- Script and files to set up Prosody with reasonably paranoid defaults and to allow hidden service connections over Tor.☆11Jul 23, 2015Updated 10 years ago
- ☆21Nov 5, 2011Updated 14 years ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- ☆10Aug 20, 2020Updated 5 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- ☆10Oct 9, 2024Updated last year
- Defensive Origins Training Schedule☆39Dec 11, 2023Updated 2 years ago
- Javascript DE-Obfuscator used to deobfuscate JS generated by javascriptobfuscator.com☆11Mar 6, 2020Updated 5 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆39Mar 25, 2024Updated last year
- hacker Tools cross-platform desktop App, support windows/MacOS/LInux ....☆44May 27, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- setup http proxy or database(oracle) sms msg table monitor to send/receive sms using telecomunication industry's SGIP/SMPP protocol☆13Jun 23, 2015Updated 10 years ago
- Verisure alarm integration with Smartthings☆13Feb 3, 2021Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12May 17, 2022Updated 3 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- Simple IRC Bot for flooding☆11Sep 12, 2011Updated 14 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Sublime Text plugin to run eslint --fix on the current file☆10Mar 21, 2024Updated last year
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.☆13Nov 14, 2023Updated 2 years ago
- Hacking Books☆21Nov 25, 2019Updated 6 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- A online steam key redeeming website☆10Apr 26, 2018Updated 7 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆37Jul 24, 2018Updated 7 years ago
- Automated OpenSSH hardening☆42May 16, 2017Updated 8 years ago
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- ☆23Jan 3, 2026Updated last month