blechschmidt / pallium
Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining
☆13Updated this week
Alternatives and similar repositories for pallium:
Users that are interested in pallium are comparing it to the libraries listed below
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆26Updated 10 months ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆13Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- ☆16Updated last year
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- Python framework for manipulating bulk WHOIS data from RIRs☆20Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Portable (static / old glibc linked) Linux binaries for red-team / blue-team☆15Updated 10 months ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆12Updated 5 months ago
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Ctf Writeups☆10Updated 4 years ago
- A collection of personal ZAP scripts☆13Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆12Updated 9 months ago
- Hybrid memory/disk map☆52Updated this week
- CloudFlare Worker Shell☆13Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated this week
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆19Updated 3 years ago
- Reversing Citrix Gateway for XSS☆14Updated last year
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆21Updated last month
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago