Node based express app to ensure privacy online through obfuscation.
☆17Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for Spartacus-as-a-Service
Users that are interested in Spartacus-as-a-Service are comparing it to the libraries listed below
Sorting:
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Oct 21, 2020Updated 5 years ago
- Meraki Dashboard API scripts in Python☆11Sep 26, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- ☆15Sep 4, 2024Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- curated list of trust regisry systems, vendors, and ecoystems☆14Jun 26, 2025Updated 8 months ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Trusted timestamping on the Tezos blockchain.☆14Aug 2, 2023Updated 2 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 5 months ago
- Decoding tool for copie_scr.sh files used in mmi systems by harmann/becker☆10Mar 28, 2017Updated 8 years ago
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- INACTIVE - Experiment: A light-weight agent to get a port scan perspective into a useable place/format for security operations☆14Apr 10, 2023Updated 2 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- prediction market on lotionjs with tendermint☆12Sep 28, 2018Updated 7 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- ☆11Jun 1, 2022Updated 3 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- LNURLProxyAPI - Try it out at https://api.lnurlproxy.me/v1/lnurl☆10Dec 8, 2022Updated 3 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Internet-Draft: The Asynchronous Remote Key Generation (ARKG) algorithm☆12Feb 27, 2026Updated last week
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago