bindle / ldap-utilsLinks
Command line utilities for managing LDAP data.
☆16Updated last year
Alternatives and similar repositories for ldap-utils
Users that are interested in ldap-utils are comparing it to the libraries listed below
Sorting:
- Dump sections or program entries from a ELF file☆25Updated 9 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- Firmware dumps for ZTE's ZXHN H298N wireless router☆17Updated 9 years ago
- Crypt::Curve25519☆12Updated 5 years ago
- Tenshi - log monitoring tool☆50Updated 3 weeks ago
- DHCP option injector☆42Updated 5 years ago
- Docker environment for 4.3BSD on VAX.☆21Updated 2 years ago
- One of the active development branches for colordiff☆24Updated 14 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- Implementing CIFS (SMB) protocol in Perl☆14Updated 7 years ago
- detects several virtualizations☆45Updated 10 years ago
- https://packages.debian.org/source/sid/netkit-telnet☆15Updated 9 years ago
- Random Shell scripts (vanilla shell / Dash, bash, zsh)☆16Updated 4 months ago
- A mirror of strobe☆12Updated 3 years ago
- Parse nmap scan data with Perl (official repo)☆37Updated 7 years ago
- Development on the Net::Perl module to support latest ciphers, key exchange mechanisms, etc.☆14Updated 3 years ago
- Crypt Breaker's Workbench☆18Updated 11 years ago
- Hashing tool supporting md5,sha1,sha256,sha512,whirlpool,jh and hmac versions of these. Includes recursive file hashing and other feature…☆68Updated 4 months ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Updated 5 years ago
- Display the contents of ASN.1 encoded data☆24Updated 11 years ago
- dcfldd - enhanced version of dd for forensics and security☆71Updated 7 years ago
- Library and tools to access the Extended File System☆18Updated this week
- autoconf replacement☆38Updated 4 months ago
- Linux/Unix Security Auditing Scripts: Lusas☆23Updated 8 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- ☆11Updated 4 months ago
- ☆59Updated 11 years ago
- Pure-Perl OpenPGP implementation☆18Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Web of trust grapher☆39Updated 7 months ago