clipos / manifestLinks
CLIP OS Manifest
☆11Updated 5 years ago
Alternatives and similar repositories for manifest
Users that are interested in manifest are comparing it to the libraries listed below
Sorting:
- CLIP OS toolkit (cosmk)☆16Updated 4 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Updated 11 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- CLIP OS product recipes☆66Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- ☆27Updated 2 years ago
- A modular pentesting framework implemented in C☆13Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- [deprecated] see README☆42Updated 5 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆145Updated 3 weeks ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated 2 years ago
- Linux kernel for CLIP OS with additional patches☆63Updated 5 years ago
- ☆16Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- Fournir des ressources actionables de sécurité pour les services biomédicaux.☆11Updated 5 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- Truehunter☆30Updated 4 years ago
- ☆25Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 7 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Updated 2 years ago