hackerschoice / erfs
☆37Updated 2 years ago
Alternatives and similar repositories for erfs:
Users that are interested in erfs are comparing it to the libraries listed below
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- Automated daily scan using Nmap and report on the differences☆21Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- ARP Man-in-the-Middle tool☆29Updated 4 months ago
- Docker environment for hackers☆14Updated 4 years ago
- Downgrade HTTP authentication on the network to capture clear-text credentials from clients☆18Updated last year
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- A local scanner for vulnerable web applications☆38Updated last week
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆15Updated 5 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- AXFR all the things!☆26Updated 3 months ago
- Global Socket Server☆31Updated 6 months ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Tips to protect your personal and company data☆28Updated 4 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆85Updated 6 months ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- trustor (PoC)☆25Updated 3 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- Binary and Static Releases☆14Updated 3 weeks ago
- Simple DNS logging server☆18Updated 3 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- A Passive SSH back-end and scanner.☆102Updated last month
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago