WojciechMula / locatedb
Python lib/prog to manipulate locatedb files
☆14Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for locatedb
- ☆12Updated 7 years ago
- A Python command line argument to object parsing library for command line application development☆14Updated 8 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Semantic SSH RSA keys☆25Updated 10 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 4 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆127Updated 11 years ago
- HMAC timing attack's w/ statistical analysis☆23Updated 11 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 8 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆9Updated 7 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Various pentest scripts☆14Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with co…☆24Updated 11 years ago
- Mass Parallel Secure Shell command execution☆12Updated 11 months ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- Linux Application Firewall☆57Updated 4 years ago
- Smartyparse: A python library for smart dynamic binary de/encoding.☆16Updated 6 years ago
- Simple network sandbox for Unix and Windows☆20Updated 5 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆28Updated 5 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 6 years ago
- Alternative hexdump.☆15Updated 8 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago