grugq / quotesLinks
quotes i like.
☆15Updated 5 years ago
Alternatives and similar repositories for quotes
Users that are interested in quotes are comparing it to the libraries listed below
Sorting:
- suspect is a simple bash triage tool☆18Updated 6 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- ☆13Updated 4 years ago
- Geolocate your files!☆16Updated 3 years ago
- ARP Man-in-the-Middle tool☆29Updated 7 months ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- module for certexfil☆15Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- ☆15Updated 8 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- Provides access to libhashcat☆30Updated last year
- ☆36Updated 5 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Password list character frequency analyzer that can output hashcat masks☆17Updated 6 years ago
- Organise and access data collected during internal network pentests☆10Updated 5 years ago
- ☆20Updated 11 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Updated 11 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 4 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago