jeffbencteux / sysctlchkLinks
A simple, POSIX shell script to check sysctl values against a predefined reference file.
☆20Updated 4 months ago
Alternatives and similar repositories for sysctlchk
Users that are interested in sysctlchk are comparing it to the libraries listed below
Sorting:
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆12Updated 3 years ago
- A tool to embed files into images☆12Updated 4 years ago
- Kiddy - (linux) kernel identity spoofer☆13Updated last year
- Hackable Windows SandBox environment☆31Updated 2 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆27Updated last year
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- ☆9Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Kibana app for RedELK☆17Updated 2 years ago
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- ☆10Updated last year
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated this week
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- This is the home of the CoinBlockerLists homepage.☆16Updated 6 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- Fast dns resolver☆13Updated last year
- ☆16Updated last month
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Detect and remove the presence of canary tokens☆20Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated last year
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago