cyphernix / arch-enemy
Arch Linux installation, security hardening and automatic deployment setup scripts.
☆16Updated 8 years ago
Alternatives and similar repositories for arch-enemy
Users that are interested in arch-enemy are comparing it to the libraries listed below
Sorting:
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- create an onion site from a directory, file, zip or an HTTP(S) site☆30Updated 6 years ago
- python tor client☆27Updated 9 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Phishing toolkit for red teams and pentesters.☆123Updated 6 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- ArchAssault PKGBUILDs☆45Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- A collection of boobie traps designed to detect malicious mischief and respond appropriately.☆15Updated 7 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Tor traffic whitelisting gateway☆71Updated 2 weeks ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆114Updated last year
- unix wildcard attacks☆133Updated 6 years ago
- Learn the very basics of different languages☆48Updated last month
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Fast SSH server and open proxy scanner☆35Updated 8 months ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆52Updated 4 years ago