blechschmidt / palliumLinks
Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining
☆14Updated 2 months ago
Alternatives and similar repositories for pallium
Users that are interested in pallium are comparing it to the libraries listed below
Sorting:
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆29Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- ShellC0de Generator☆11Updated 4 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆30Updated last year
- Monitor malware scanning services for your payloads☆11Updated 4 years ago
- PAM Backdoor☆28Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated 4 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- ☆24Updated 4 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆10Updated 10 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆15Updated 3 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Advanced threat detection solution for Linux.☆35Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆14Updated 4 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago