Live-Armor: Building Custom Linux Live Images for Security Sandboxing
☆11Mar 25, 2015Updated 10 years ago
Alternatives and similar repositories for live-armor
Users that are interested in live-armor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ida Plugin to Use the Awsome Scylla plugin☆22May 4, 2015Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- GitHub system status indicator☆13Apr 8, 2021Updated 4 years ago
- Nyancoin client software☆12Oct 20, 2021Updated 4 years ago
- Unpacking tool for Inno Setup installers☆39Mar 9, 2024Updated 2 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- 🔓 Yet Another S3 Bucket Leak☆29Aug 16, 2018Updated 7 years ago
- SSH Manager for your keys and config hosts.☆10Jun 2, 2021Updated 4 years ago
- Unofficial mirror of haproxy-1.5 repository☆12Mar 25, 2016Updated 9 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- A linux based program that encrypts or decrypts a file☆12Jan 5, 2022Updated 4 years ago
- 📦 A GitHub Action to watch for GitHub Wiki Page changes, and then notify a Slack channel☆16Mar 9, 2026Updated 2 weeks ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Jul 13, 2019Updated 6 years ago
- ☆22Apr 2, 2024Updated last year
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- 😴 Insomnia template tags for interacting with GitHub APIs using GitHub Apps☆26Jan 9, 2023Updated 3 years ago
- WordPress Optimization Solutions☆10Mar 13, 2019Updated 7 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A Helm chart that deploys a web app defined in docker-compose.yml to Kubernetes☆14Mar 28, 2018Updated 7 years ago
- A markdown tools which can convert markdown file to both HTML and PDF.☆11Apr 13, 2015Updated 10 years ago
- Turn log files into data.☆17May 10, 2025Updated 10 months ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Fork of Mark Ruys' check_glusterfs from http://exchange.nagios.org/directory/Plugins/System-Metrics/File-System/GlusterFS-checks/details☆13May 15, 2019Updated 6 years ago
- ☆12May 1, 2023Updated 2 years ago
- Ansible role for installing/configuring centminmod on CentOS 7☆13May 24, 2017Updated 8 years ago
- ☆10May 30, 2015Updated 10 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 11 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- User Behavior Analysis using OSSEC on cloud infrastructures☆10Feb 27, 2017Updated 9 years ago