A set of tools to transfer data over a unidirectional network link (typically a network diode).
☆58Apr 2, 2017Updated 8 years ago
Alternatives and similar repositories for hairgap
Users that are interested in hairgap are comparing it to the libraries listed below
Sorting:
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- The BGP Atlas Monitor☆16Jan 24, 2018Updated 8 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Android Debug Utility Suite☆17Apr 19, 2015Updated 10 years ago
- ☆18Jun 30, 2017Updated 8 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Mar 8, 2018Updated 8 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- Machine Learning for malicious Javascript code detection☆19Jan 13, 2017Updated 9 years ago
- Notes about information security and linux system administration.☆17Jul 28, 2016Updated 9 years ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆52Feb 14, 2025Updated last year
- petit programme marrant☆30Oct 12, 2025Updated 4 months ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- Modified edition of cuckoomon☆52Jun 4, 2018Updated 7 years ago
- ☆29Oct 8, 2019Updated 6 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Mar 5, 2014Updated 12 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Apr 14, 2025Updated 10 months ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- WER Server☆19Feb 26, 2017Updated 9 years ago
- Debugger for the Shannon Baseband☆58Jun 15, 2020Updated 5 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- VBA analysis tools☆25Aug 15, 2025Updated 6 months ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- Historical Tracking of MAC Address Assignments☆41Updated this week