blechschmidt / pallium
Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining
☆13Updated last month
Alternatives and similar repositories for pallium:
Users that are interested in pallium are comparing it to the libraries listed below
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆26Updated 11 months ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ☆10Updated 2 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- ☆8Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- Ctf Writeups☆10Updated 4 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆29Updated 7 months ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆13Updated last year
- GoLismero web fingerprint population tool☆18Updated 11 years ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆12Updated this week
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 8 months ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Public exploits☆15Updated 6 years ago
- Visualization layer and helper for relevant IT related documentation and operation☆9Updated 2 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆19Updated 11 months ago
- CloudFlare Worker Shell☆14Updated 4 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Cloud metadata extraction tools and scripts☆34Updated last year
- Exploit for win10 SMB3.1☆17Updated 4 years ago