blechschmidt / pallium
Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining
☆13Updated 2 months ago
Alternatives and similar repositories for pallium:
Users that are interested in pallium are comparing it to the libraries listed below
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆26Updated last year
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated 2 weeks ago
- Subdomain enumeration using Cloudflare's scanning tool.☆42Updated last year
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 7 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆19Updated last year
- ☆10Updated 2 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆13Updated last year
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆19Updated 3 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆30Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Yet another powerful payload encoder/decoder☆14Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆20Updated 2 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆23Updated 6 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆13Updated last month
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ☆8Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Portable (static / old glibc linked) Linux binaries for red-team / blue-team☆15Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆15Updated 2 years ago
- Public exploits☆14Updated 6 years ago
- Local Privilege Escalation Miner☆25Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated last week