cea-sec / hairgapView external linksLinks
A set of tools to transfer data over a unidirectional network link (typically a network diode).
☆57Apr 2, 2017Updated 8 years ago
Alternatives and similar repositories for hairgap
Users that are interested in hairgap are comparing it to the libraries listed below
Sorting:
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- The BGP Atlas Monitor☆15Jan 24, 2018Updated 8 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated last month
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆20Mar 28, 2018Updated 7 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- ☆19Jun 30, 2017Updated 8 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Mar 8, 2018Updated 7 years ago
- Machine Learning for malicious Javascript code detection☆19Jan 13, 2017Updated 9 years ago
- Notes about information security and linux system administration.☆17Jul 28, 2016Updated 9 years ago
- The Dumb Network Fuzzer☆20Jul 18, 2023Updated 2 years ago
- petit programme marrant☆30Oct 12, 2025Updated 4 months ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- Modified edition of cuckoomon☆51Jun 4, 2018Updated 7 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Industrial Control Systems Network Scanner☆23Nov 8, 2015Updated 10 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Apr 14, 2025Updated 10 months ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- WER Server☆19Feb 26, 2017Updated 8 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- VBA analysis tools☆25Aug 15, 2025Updated 5 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- ☆26Jun 23, 2016Updated 9 years ago
- Learn how to connect raspberry pi to laptop wirelessly. Share your raspberry pi screen on laptop and control it with laptop mouse and key…☆11Jul 4, 2021Updated 4 years ago
- Authenticated encryption for streams in Go☆30Dec 18, 2023Updated 2 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated last month
- Verifiable Random Function☆30Jun 22, 2020Updated 5 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- Code released with Shmoocon Firetalks and Epilogue talks☆45Jan 14, 2016Updated 10 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago