S0AndS0 / Perinoid_Linux_Project
Where a Linux sys-admin's perinoid scripts are collected.
☆10Updated 9 years ago
Alternatives and similar repositories for Perinoid_Linux_Project:
Users that are interested in Perinoid_Linux_Project are comparing it to the libraries listed below
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- ☆30Updated 9 years ago
- ☆12Updated 8 years ago
- Replicating Encrypted PasteBin☆75Updated 7 years ago
- DNS tunnel☆60Updated 11 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 12 years ago
- Install script for grsecurity for Debian environments☆58Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- PPPoAT - PPP over Any Transport☆22Updated 3 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Bruteforce attack blocker (ssh, FTP, SMTP, and more)☆64Updated 4 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- Packet-o-matic NG !☆65Updated 7 months ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 9 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- It contains hardenedlinux community documentation.☆60Updated last year
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- Password manager for USB Armory☆37Updated 9 years ago
- Airprobe for frequency hopping GSM channels☆28Updated 10 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago