coldfix / cisco-encryptLinks
Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)
☆10Updated 5 years ago
Alternatives and similar repositories for cisco-encrypt
Users that are interested in cisco-encrypt are comparing it to the libraries listed below
Sorting:
- Parse nmap scan data with Perl (official repo)☆38Updated 6 years ago
- show which process did what DNS queries☆35Updated 7 years ago
- A simple, handy network addressing multitool with plenty of features☆104Updated 6 years ago
- Fast SSH server and open proxy scanner☆36Updated 5 months ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆23Updated 4 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆36Updated 2 years ago
- ☆23Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- SentinelOne's SACK CVE Fixer☆22Updated 6 years ago
- IPv6 auto discovery tool☆91Updated last month
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12Updated 4 years ago
- Docker image for PowerShell remoting from Linux to Windows☆36Updated 7 years ago
- OpenSSHd Security Config Checker☆25Updated 3 months ago
- Tools for hunting security threats☆12Updated 5 years ago
- ssh jump host appliance☆26Updated 3 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Scripts to gather system configuration information for offline/remote auditing☆83Updated 2 years ago
- ☆49Updated 11 years ago
- Automate Recon process using Shell Scripting☆11Updated 4 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- A scanner of the "World's Scariest" scanner☆17Updated 2 years ago
- CISOfy Handbook☆35Updated 9 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- A simple, POSIX shell script to check sysctl values against a predefined reference file.☆20Updated 10 months ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 7 years ago
- Automatic VLAN configuration tool for Linux☆25Updated 6 years ago
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆26Updated 8 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆114Updated 2 years ago
- Web of trust grapher☆38Updated 5 months ago