juliocesarfort / nukemyluks
Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.
☆49Updated 8 years ago
Alternatives and similar repositories for nukemyluks:
Users that are interested in nukemyluks are comparing it to the libraries listed below
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- ☆15Updated 8 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- [- mxmap -]☆11Updated 2 weeks ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Updated 6 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆25Updated 6 years ago
- SlyPI☆19Updated 11 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- An ARP Poisoning Defender script☆43Updated 6 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago
- Truehunter☆31Updated 3 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Protect your parents from phishing☆39Updated 7 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- Selective DNS proxy forwarding based on DNS threat blocking providers intelligence.☆57Updated 7 years ago
- Rogue AP killer☆89Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago