hackerschoice / erfs
☆37Updated 2 years ago
Alternatives and similar repositories for erfs:
Users that are interested in erfs are comparing it to the libraries listed below
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Automated daily scan using Nmap and report on the differences☆18Updated 6 years ago
- ARP Man-in-the-Middle tool☆28Updated 2 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆16Updated 5 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Docker environment for hackers☆14Updated 4 years ago
- Clone network interface from one host as a tap interface on another host☆57Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Parse nmap scan data with Perl (official repo)☆36Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆68Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Binary and Static Releases☆13Updated 9 months ago
- DNS logging, detection, ...☆15Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆18Updated 3 years ago
- A Passive SSH back-end and scanner.☆103Updated 8 months ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆51Updated 12 years ago
- ☆14Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆83Updated 4 months ago
- CISOfy Handbook☆30Updated 8 years ago