Secure approach to secure file storage in untrusted environments.
☆35Mar 26, 2019Updated 7 years ago
Alternatives and similar repositories for Thalos
Users that are interested in Thalos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Hacking Wars Capture The Flag☆10Dec 29, 2016Updated 9 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆132Oct 2, 2020Updated 5 years ago
- ☆11Apr 28, 2017Updated 9 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 9 years ago
- ☆14Jan 24, 2016Updated 10 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Archive of leaked Equation Group materials☆15Aug 17, 2016Updated 9 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Aug 20, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- The Seeker of IOC☆132Oct 2, 2020Updated 5 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29May 2, 2016Updated 10 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆94Jul 1, 2019Updated 6 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- Noddos client☆74Sep 11, 2019Updated 6 years ago
- edge --> powerpoint --> remote-file --> shell☆11May 17, 2019Updated 6 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- ☆106May 28, 2021Updated 4 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- lazysort is a sorting algorithm that procrastinates doing work as much as possible.☆17Nov 9, 2017Updated 8 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- ☆19Mar 15, 2018Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆139Feb 8, 2023Updated 3 years ago
- MAC address randomizer for the Qualcomm WCNSS Platform Driver☆15Sep 20, 2018Updated 7 years ago