hackerschoice / erfsLinks
☆37Updated 2 years ago
Alternatives and similar repositories for erfs
Users that are interested in erfs are comparing it to the libraries listed below
Sorting:
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- Automated daily scan using Nmap and report on the differences☆21Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆27Updated last year
- Clone network interface from one host as a tap interface on another host☆59Updated 4 years ago
- ☆15Updated 5 years ago
- Docker environment for hackers☆15Updated 4 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆69Updated last year
- ARP Man-in-the-Middle tool☆29Updated 5 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆195Updated last month
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Downgrade HTTP authentication on the network to capture clear-text credentials from clients☆18Updated last year
- A Passive SSH back-end and scanner.☆102Updated 2 months ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Global Socket Server☆35Updated last month
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Viproxy (Interactive TCP/TLS proxy forked from em-proxy)☆11Updated 10 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆54Updated 12 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago