Secure approach to secure file storage in untrusted environments.
☆35Mar 26, 2019Updated 7 years ago
Alternatives and similar repositories for Thalos
Users that are interested in Thalos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Hacking Wars Capture The Flag☆10Dec 29, 2016Updated 9 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Sensor software☆68Oct 14, 2021Updated 4 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Aug 20, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Perform timing attacks against web applications☆126Oct 13, 2019Updated 6 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆94Jul 1, 2019Updated 6 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29May 2, 2016Updated 9 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- Noddos client☆74Sep 11, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and fir…☆40Dec 5, 2017Updated 8 years ago
- edge --> powerpoint --> remote-file --> shell☆12May 17, 2019Updated 6 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- OSINT - SOCMINT (social media intelligence) Twitter hashtag analyzer☆20Apr 8, 2019Updated 7 years ago
- Zabbix template for oVirt and libvirt☆13Nov 18, 2020Updated 5 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- ☆19Mar 15, 2018Updated 8 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆139Feb 8, 2023Updated 3 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆70Feb 22, 2021Updated 5 years ago
- ☆202Feb 1, 2022Updated 4 years ago