hashdist / hashstack
Collection of software profiles for HashDist
☆51Updated 6 years ago
Alternatives and similar repositories for hashstack:
Users that are interested in hashstack are comparing it to the libraries listed below
- The HashDist environment management system☆108Updated 7 years ago
- ☆30Updated 10 years ago
- ☆15Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆28Updated 9 years ago
- Salt recipe to automatically secure sshd (and piss off the NSA)☆16Updated 8 years ago
- Diceware passphrase generator☆20Updated 11 years ago
- Common utility modules shared between various Python based Yubico projects.☆12Updated 8 years ago
- Utilities for testing OSX on travis-ci.org☆35Updated 5 years ago
- SSH configuration analysis☆75Updated 2 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 8 years ago
- High-level interface to Kerberos☆21Updated 3 years ago
- A Python port of the triplesec library.☆82Updated last year
- Cython wrappers for Google's sparsehash library, and the murmur hash functions☆17Updated 10 years ago
- A colony of interacting processes☆23Updated 10 months ago
- A parallel SSH-based remote machine management system☆85Updated 9 years ago
- Experimental app for visualizing wifi packet captures☆25Updated 6 years ago
- Synchronise remote SSH authorised_keys☆23Updated 6 years ago
- Python Library for InterNetworking with TeleHash☆26Updated 10 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- YubiPAM is a module for PAM that provides support for One Time Passwords (OTP) authentication.☆58Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Twerp is the telephone hackers toolkit. It's also a command-line app for Twilio, written in Python☆26Updated 4 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 5 months ago
- Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.…☆28Updated 3 years ago
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆11Updated 12 years ago