Secure approach to secure file storage in untrusted environments.
☆35Mar 26, 2019Updated 6 years ago
Alternatives and similar repositories for Thalos
Users that are interested in Thalos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Hacking Wars Capture The Flag☆10Dec 29, 2016Updated 9 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆131Oct 2, 2020Updated 5 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Sensor software☆68Oct 14, 2021Updated 4 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Perform timing attacks against web applications☆126Oct 13, 2019Updated 6 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Jul 1, 2019Updated 6 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29May 2, 2016Updated 9 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- Noddos client☆74Sep 11, 2019Updated 6 years ago
- NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and fir…☆40Dec 5, 2017Updated 8 years ago
- OSINT - SOCMINT (social media intelligence) Twitter hashtag analyzer☆20Apr 8, 2019Updated 6 years ago
- Zabbix template for oVirt and libvirt☆13Nov 18, 2020Updated 5 years ago
- ☆107May 28, 2021Updated 4 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- ☆19Mar 15, 2018Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆70Feb 22, 2021Updated 5 years ago
- ☆201Feb 1, 2022Updated 4 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- AndroidManifest.xml security auditor☆71Jul 6, 2012Updated 13 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆295Aug 1, 2023Updated 2 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago