NSAKEY / happy-dance
Automated OpenSSH hardening
☆42Updated 7 years ago
Alternatives and similar repositories for happy-dance:
Users that are interested in happy-dance are comparing it to the libraries listed below
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Password analysis software☆37Updated 9 years ago
- Web of trust grapher☆39Updated 10 months ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- python tor client☆26Updated 9 years ago
- DNS zone transfer research☆57Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- A web spider's worst nightmare.☆52Updated 12 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Scripts that are suited for blue teams☆33Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago
- ☆15Updated 8 years ago
- A tool for netpens.☆35Updated 5 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- DHCP option injector☆40Updated 4 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- ☆25Updated 7 years ago
- post-exploitation tools☆15Updated 6 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago