hackerschoice / erfs
☆37Updated 2 years ago
Alternatives and similar repositories for erfs:
Users that are interested in erfs are comparing it to the libraries listed below
- THC "R U There" network discovery tool☆27Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Docker environment for hackers☆14Updated 4 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated last month
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- ARP Man-in-the-Middle tool☆28Updated 3 months ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 3 years ago
- ☆14Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- ☆14Updated 5 years ago
- Tips to protect your personal and company data☆28Updated 4 years ago
- Automated daily scan using Nmap and report on the differences☆20Updated 7 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- A tool to run a command when the target of a symlink changes☆16Updated 8 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 3 years ago
- ☆23Updated 8 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- Binary and Static Releases☆13Updated this week
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- Zero-trust SSH CA☆29Updated 6 months ago
- A local scanner for vulnerable web applications☆38Updated last week
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Web of trust grapher☆39Updated 3 weeks ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- CISOfy Handbook☆31Updated 8 years ago