cyphernix / arch-enemyLinks
Arch Linux installation, security hardening and automatic deployment setup scripts.
☆20Updated 9 years ago
Alternatives and similar repositories for arch-enemy
Users that are interested in arch-enemy are comparing it to the libraries listed below
Sorting:
- Intelligence and Reconnaissance Package/Bundle installer.☆246Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆118Updated 2 years ago
- Detect snooper on your system!☆85Updated 9 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆336Updated 5 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- ArchAssault PKGBUILDs☆45Updated 10 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Passive Vulnerability Auditor☆136Updated 9 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Hacker OPSEC☆101Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆245Updated 5 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆105Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- An IRC based tool for testing the capabilities of a botnet.☆143Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆153Updated 8 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Updated 6 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated 2 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆101Updated 6 years ago
- Images and scripts for virtualization☆41Updated 4 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- Capturing, analysing and responding to cyber attacks☆172Updated last year
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago