Launch a fresh docker container per SSH connection
☆50Oct 18, 2023Updated 2 years ago
Alternatives and similar repositories for docker-tcp-switchboard
Users that are interested in docker-tcp-switchboard are comparing it to the libraries listed below
Sorting:
- Module to convert Cuckoo .json to .mist☆10Apr 8, 2020Updated 5 years ago
- ☆14Jan 24, 2016Updated 10 years ago
- Eye state localisation and detection for use in Advanced Driver Assistance System.☆18Jan 25, 2019Updated 7 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Simple RISC Machine☆15Apr 29, 2019Updated 6 years ago
- "Polymorphic" shellcode generator (x86)☆25Oct 28, 2014Updated 11 years ago
- A very tiny PHP shell☆27Jan 26, 2012Updated 14 years ago
- A Roll 20 character sheet for Cyberpunk RED.☆10Dec 3, 2020Updated 5 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- ☆28May 9, 2022Updated 3 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Sep 29, 2014Updated 11 years ago
- Dirt cheap, easy to assemble, quality DIY NIR-HEG☆11Oct 16, 2022Updated 3 years ago
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- This app was created for testing the automotive APIs in Android Automotive OS. Mainly focused on CarInfoManger and CarPropertyManager.☆10Mar 26, 2021Updated 4 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Cisco Meraki CMX WiFi Presence receiver☆12Apr 17, 2019Updated 6 years ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- Escape the Room Game by Thought Works☆12Jan 4, 2023Updated 3 years ago
- Collection of tools for fetching and processing Street View imagery, adapted from code by @kotarohara☆12Feb 13, 2026Updated 2 weeks ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- JS library that helps get the closest AWS region from a country code☆12Jan 14, 2023Updated 3 years ago
- An ESM package that uses Web Streams API to create v1, v2 or hybrid torrents in your web browser☆10Aug 5, 2025Updated 6 months ago
- Cloak files using text based steganography output to obsfucate what data they contain. Coded in Powershell. This is a port of TryCatchH…☆44Feb 6, 2021Updated 5 years ago
- This is the start page i use for raspberry pi zero usb dongle☆12Oct 30, 2016Updated 9 years ago
- ☆13Dec 30, 2024Updated last year
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Download m3u8 video☆10Aug 31, 2020Updated 5 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year