autistic-symposium / shell-whiz-toolkitLinks
👾 bt3gl's personal resources and scripts over the years (e.g., dotfiles, shell, zsh, git, tmux, vim, vpn, chef, scripts, configs, rooting devices)
☆16Updated 5 months ago
Alternatives and similar repositories for shell-whiz-toolkit
Users that are interested in shell-whiz-toolkit are comparing it to the libraries listed below
Sorting:
- 👾 monitor web server's log files against CSRF attacks (a modification of apache's mod_security to log these attacks)☆14Updated 7 months ago
- 👾 research on computation 3D photography☆13Updated 7 months ago
- 👾 old blog on security, hacking, and machine learning☆6Updated 7 months ago
- 👾 twitter-like (anti-) social network in flask☆13Updated 7 months ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- Awesome little automater☆17Updated 12 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- ☆21Updated 12 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 9 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Various pentest scripts☆13Updated 11 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 3 years ago
- ☆17Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- ☆11Updated 4 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Updated 7 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 10 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago