cyphernix / arch-enemy
Arch Linux installation, security hardening and automatic deployment setup scripts.
☆15Updated 8 years ago
Alternatives and similar repositories for arch-enemy:
Users that are interested in arch-enemy are comparing it to the libraries listed below
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- NSA headline generator☆32Updated 11 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 2 months ago
- qubes rpm for i3☆32Updated 2 months ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- An ARP Poisoning Defender script☆43Updated 6 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Phishing toolkit for red teams and pentesters.☆124Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- ArchAssault PKGBUILDs☆45Updated 9 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- A honeypot for malware that propagates via USB storage devices☆96Updated 10 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago