SomajitDey / gibberishLinks
Git and Bash Based Encrypted Remote Interactive Shell (GiBBERISh). For when you cannot use SSH.
☆12Updated 4 years ago
Alternatives and similar repositories for gibberish
Users that are interested in gibberish are comparing it to the libraries listed below
Sorting:
- Signing-key abuse and update exploitation framework☆132Updated 7 months ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆98Updated 3 years ago
- ☆16Updated last month
- Rust-based password mutator for brute force attacks☆13Updated 9 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆29Updated last year
- masscan with exclusive excludes☆58Updated 2 years ago
- A proof-of-concept reverse-shell written in rust.☆32Updated 6 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆99Updated 2 years ago
- ☆11Updated 3 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- hashgen - the blazingly fast hash generator☆39Updated 3 weeks ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- ☆85Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Network Traffic Fuzzer☆17Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆15Updated 5 months ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- Analyse binaries for missing security features, information disclosure and more...☆86Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 3 years ago
- A way to use fonts to obfuscate text.☆48Updated 3 years ago
- Manjaro LPE☆34Updated 2 years ago
- PAM Backdoor☆33Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago
- Detect and remove the presence of canary tokens☆24Updated 2 years ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- 🔗 A curated list of awesome Caido related projects☆45Updated 9 months ago
- Common User Passwords Profiler (CUPP) in Rust☆26Updated last year
- Bruteforce with a stream of permutations of a specific pattern☆26Updated 5 months ago