jwilk / git-landmine
create local malicious git repo
☆49Updated last week
Alternatives and similar repositories for git-landmine:
Users that are interested in git-landmine are comparing it to the libraries listed below
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 2 months ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated 8 months ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆72Updated last week
- noticing and preventing network requests should be easy☆82Updated 2 weeks ago
- Python 3 alternative command line interface for AWS Route 53; enables simple record management and dynamic DNS☆11Updated last month
- WIP - scripts for analyzing the (in)security of Chrome extensions☆26Updated 10 months ago
- List files in categories (and columns) - from Coherent UNIX☆41Updated 4 years ago
- Git worktree navigator☆27Updated 11 months ago
- Simple inbound/outbound packet sniffer☆31Updated 3 months ago
- Make bar charts on the terminal.☆89Updated 4 years ago
- Kill orphan processes☆107Updated 10 months ago
- cross shell aliases☆60Updated 10 months ago
- Track the RAM usage of a process and its descendants in real time☆27Updated 3 weeks ago
- Enabling SSH Access Control Using Github Repo Permissions (No Key File)☆9Updated 4 months ago
- this URL is also malicious(?!) shell script☆142Updated last week
- a web fuzzer using the httpipe format☆100Updated 10 months ago
- immutable backups so simple that unborkable☆55Updated 2 months ago
- Template for sending a GitHub webhook over a zero trust, private network based on https://github.com/openziti/ziti☆58Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆100Updated 11 months ago
- A centralised store for your personal SSH keys☆61Updated 2 years ago
- Visualize binary files☆116Updated 3 weeks ago
- hackernews data☆33Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated this week
- psitop - top for /proc/pressure☆78Updated last year
- Pākiki is an intercepting proxy designed to help penetration testers find security vulnerabilities in web or mobile applications. This re…☆34Updated 6 months ago
- Create and manage bare metal disk images from docker images☆34Updated last year
- experimenting with a python based shell☆60Updated last year
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- Literate testing for command-line programs☆40Updated last month
- Modern re-implementation of Veles visualization☆46Updated 6 months ago