Automatically exported from code.google.com/p/rough-auditing-tool-for-security
☆89May 5, 2021Updated 4 years ago
Alternatives and similar repositories for rough-auditing-tool-for-security
Users that are interested in rough-auditing-tool-for-security are comparing it to the libraries listed below
Sorting:
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 4 months ago
- ☆14Mar 4, 2024Updated 2 years ago
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- 冰蝎客户端源码☆14Apr 15, 2020Updated 5 years ago
- A script to bring up PPPoE sessions using Python and scapy☆18Jun 18, 2015Updated 10 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- Canari local transforms pcap file analysis☆30Apr 14, 2014Updated 11 years ago
- CVE-2018-3245☆14Oct 25, 2018Updated 7 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- Parses IE's Automatic Crash Recovery Files☆16Feb 3, 2017Updated 9 years ago
- Imports MSDN documentation into IDA Pro☆52Jan 10, 2012Updated 14 years ago
- PyCes (Python Code Scanner) - Enhanced Security Static Analysis Tool for Python☆11Apr 18, 2019Updated 6 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 7 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Parses MSDN documentation into an XML file☆31Jan 10, 2012Updated 14 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- 分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴☆23Aug 27, 2018Updated 7 years ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- Heap analysis tooling for dlmalloc☆32Jun 13, 2022Updated 3 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Yet Another Source Code Analyzer☆184Jan 27, 2022Updated 4 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Container Security and Serverless Training☆13Dec 8, 2022Updated 3 years ago
- tool for data recording with a SDR☆26Dec 4, 2020Updated 5 years ago