cyphernix / arch-enemyLinks
Arch Linux installation, security hardening and automatic deployment setup scripts.
☆16Updated 8 years ago
Alternatives and similar repositories for arch-enemy
Users that are interested in arch-enemy are comparing it to the libraries listed below
Sorting:
- Detect snooper on your system!☆84Updated 8 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Fast SSH server and open proxy scanner☆35Updated 8 months ago
- ArchAssault PKGBUILDs☆45Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Fetch, install and search exploit archives from exploit sites.☆115Updated last year
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 12 years ago
- Configures Whonix to run as a ProxyVM / AppVM on Qubes OS☆17Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 13 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆30Updated 6 years ago
- A collection of boobie traps designed to detect malicious mischief and respond appropriately.☆15Updated 7 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Twitter as an extra entropy source☆103Updated 6 years ago