grugq / quotesLinks
quotes i like.
☆15Updated 5 years ago
Alternatives and similar repositories for quotes
Users that are interested in quotes are comparing it to the libraries listed below
Sorting:
- ☆13Updated 4 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Geolocate your files!☆16Updated 3 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆15Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- ☆18Updated 2 years ago
- Dig through Git commits and logs☆21Updated 6 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- ☆36Updated 5 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Simple Go Discord Bot☆22Updated 2 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 5 years ago
- Python libraries for Windows system coding☆14Updated 5 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Updated 7 years ago