SecurityInnovation / ofxposternLinks
Vulnerability scanner for OFX servers
☆32Updated 2 years ago
Alternatives and similar repositories for ofxpostern
Users that are interested in ofxpostern are comparing it to the libraries listed below
Sorting:
- ☆15Updated 6 years ago
- WaitList.dat Parser☆26Updated 7 years ago
- ☆22Updated 7 years ago
- A USB armory based USB sandbox☆22Updated 8 years ago
- Web of trust grapher☆39Updated 7 months ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Rogue AP killer☆91Updated 8 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- USB armory Debian base image☆84Updated 3 months ago
- iWar - The intelligent war dialer.☆29Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Implementation of the ciphers in iClass☆45Updated 2 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Tool to verify DKIM signatures on an mbox of emails☆96Updated 7 years ago
- Command line utility for parsing certificates☆67Updated 4 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- Artifacts for the USENIX publication.☆58Updated 6 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 4 years ago
- Source to www.draw.io☆98Updated 6 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.☆48Updated 4 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Script for querying Google home devices☆11Updated 7 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆29Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- Probe LAN devices from a web browser.☆79Updated 6 years ago
- Linux file read monitor☆91Updated 2 years ago
- ☆83Updated 3 years ago
- PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP …☆27Updated 12 years ago
- DNS zone transfer research☆59Updated 9 years ago