Secure approach to secure file storage in untrusted environments.
☆35Mar 26, 2019Updated 6 years ago
Alternatives and similar repositories for Thalos
Users that are interested in Thalos are comparing it to the libraries listed below
Sorting:
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 6 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 3 weeks ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- Zabbix template for oVirt and libvirt☆13Nov 18, 2020Updated 5 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆131Oct 2, 2020Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Jul 1, 2019Updated 6 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- ☆107May 28, 2021Updated 4 years ago
- NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and fir…☆40Dec 5, 2017Updated 8 years ago
- OSINT - SOCMINT (social media intelligence) Twitter hashtag analyzer☆20Apr 8, 2019Updated 6 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Sensor software☆68Oct 14, 2021Updated 4 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Fuzzing framework to target native components of android applications☆22Oct 22, 2022Updated 3 years ago
- Noddos client☆74Sep 11, 2019Updated 6 years ago
- Perform timing attacks against web applications☆126Oct 13, 2019Updated 6 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Dec 12, 2017Updated 8 years ago
- AndroidManifest.xml security auditor☆71Jul 6, 2012Updated 13 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆138Feb 8, 2023Updated 3 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago