SpiderLabs / modsec-sdbm-utilLinks
Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to list the SDBM contents with filters such as: expired or invalid items only.
☆22Updated last year
Alternatives and similar repositories for modsec-sdbm-util
Users that are interested in modsec-sdbm-util are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- Check for HTTP Security Headers☆14Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- ModSecurity status☆34Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 9 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 7 years ago
- Parse HTTP Security Headers☆40Updated last year
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- Universal stack-based buffer overfow exploitation tool☆23Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 14 years ago
- Arp spoof detection tool☆25Updated 8 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago