S0AndS0 / Perinoid_Linux_ProjectLinks
Where a Linux sys-admin's perinoid scripts are collected.
☆10Updated 9 years ago
Alternatives and similar repositories for Perinoid_Linux_Project
Users that are interested in Perinoid_Linux_Project are comparing it to the libraries listed below
Sorting:
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Packet-o-matic NG !☆65Updated last week
- ☆12Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 9 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆34Updated 6 years ago
- Encrypted Text Messaging☆147Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- opmsg p2p transport network☆71Updated 6 years ago
- ☆56Updated 7 years ago
- ☆30Updated 10 years ago
- How to set Tor to run as background process on every OSX login☆39Updated 7 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 6 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 4 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- ☆17Updated 7 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- Subgraph Metaproxy is a proxy redirector.☆21Updated 8 years ago
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 11 years ago