blechschmidt / palliumLinks
Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining
☆14Updated 8 months ago
Alternatives and similar repositories for pallium
Users that are interested in pallium are comparing it to the libraries listed below
Sorting:
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Public exploits☆16Updated 7 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Subdomain enumeration using Cloudflare's scanning tool.☆46Updated 4 months ago
- ☆25Updated 3 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- Packet crafting, injection and sniffing tool☆72Updated 4 months ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated last year
- Build wordlists from the common-crawl index☆12Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Left To My Own Devices - NT hash tools☆41Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 11 months ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Local Privilege Escalation Miner☆29Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆48Updated last year
- The WASM Based Security Toolkit for the Web First Paradigm☆37Updated 2 years ago
- PAM Backdoor☆32Updated 2 years ago
- Another vulnerability scanner☆19Updated 3 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 3 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆17Updated 3 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago