astro / chaosbayLinks
BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress
☆33Updated 11 years ago
Alternatives and similar repositories for chaosbay
Users that are interested in chaosbay are comparing it to the libraries listed below
Sorting:
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- DirBuster successor in Erlang☆37Updated 8 years ago
- Certificate Expiration Monitor script☆27Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Stochastic Traffic Factoring Utility☆15Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Generic HTTPS proxy for logging non-HTTP traffic☆23Updated 7 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- ☆16Updated 9 years ago
- ☆26Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago