SomajitDey / gibberishLinks
Git and Bash Based Encrypted Remote Interactive Shell (GiBBERISh). For when you cannot use SSH.
☆12Updated 4 years ago
Alternatives and similar repositories for gibberish
Users that are interested in gibberish are comparing it to the libraries listed below
Sorting:
- Detect and remove the presence of canary tokens☆22Updated last year
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Signing-key abuse and update exploitation framework☆130Updated 2 months ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆30Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆124Updated this week
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- ☆10Updated 3 years ago
- masscan with exclusive excludes☆57Updated last year
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- RedLizard Rust TCP Reverse Shell Server/Client☆138Updated last year
- A proof-of-concept reverse-shell written in rust.☆33Updated 6 years ago
- A cross-platform Nim implant for Prelude Operator☆32Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆25Updated 3 years ago
- ☆16Updated 3 months ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- Bruteforce with a stream of permutations of a specific pattern☆27Updated this week
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆12Updated 3 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆14Updated 3 weeks ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆36Updated last month
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆33Updated 2 years ago
- Phrack Crackme Challenges☆17Updated 3 months ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- An uploader honeypot designed to look like poor website security.☆28Updated 3 months ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- A way to use fonts to obfuscate text.☆45Updated 2 years ago
- Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam☆103Updated 3 years ago