int0x80 / notes
Random notes about the universe and stuff
☆16Updated 4 years ago
Alternatives and similar repositories for notes:
Users that are interested in notes are comparing it to the libraries listed below
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- My Raspberry Pi cluster project☆9Updated 5 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated last year
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- ☆11Updated 7 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Network visualizer tool built using Processing☆24Updated 3 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆15Updated 8 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆29Updated 6 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- detects several virtualizations☆44Updated 9 years ago
- Rumble Network Discovery API☆17Updated 10 months ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Parse nmap scan data with Perl (official repo)☆36Updated 6 years ago
- Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689☆18Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Scapy tools and scripts☆18Updated 4 years ago
- ☆14Updated 5 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated last month