Nohidy the system admins best friend, multi platform auditing tool
☆14Feb 6, 2018Updated 8 years ago
Alternatives and similar repositories for Nohidy
Users that are interested in Nohidy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 11 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Node module for Linux user and group control.☆13Dec 31, 2025Updated 2 months ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Environment modules for the ILRI, Nairobi HPC cluster☆11Mar 12, 2026Updated last week
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- This is a simple but very powerful sms spamming program that is coded in visual basic. I could not find a program for my needs with no vi…☆12May 24, 2013Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- ☆12Jul 17, 2016Updated 9 years ago
- a rtsp streaming server based on gstreamer☆17Nov 19, 2009Updated 16 years ago
- [OUTDATED AND UNSUPPORTED] Android Surveilance Tool, which works like a HTTP Shell to receive and executes commands and send data to the …☆19Aug 20, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Locates installed Perl modules.☆22Apr 16, 2023Updated 2 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Python pcap sanitizer☆22Sep 2, 2022Updated 3 years ago