grugq / quotesLinks
quotes i like.
☆15Updated 5 years ago
Alternatives and similar repositories for quotes
Users that are interested in quotes are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆15Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Phishing Toolkit☆20Updated 7 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 5 years ago
- ☆18Updated last year
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Take a word list and convert 1337 spellings back to normal☆12Updated 7 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Simple Go Discord Bot☆22Updated 2 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Organise and access data collected during internal network pentests☆10Updated 5 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 4 years ago
- ☆13Updated 7 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago