jwilk / git-landmineLinks
create local malicious git repo
☆51Updated 5 months ago
Alternatives and similar repositories for git-landmine
Users that are interested in git-landmine are comparing it to the libraries listed below
Sorting:
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 5 months ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated 7 months ago
- A web fuzzer using the httpipe format☆101Updated last year
- Notify when YubiKey needs touch on macOS☆75Updated 2 months ago
- ☆93Updated last year
- CLI based packet reader in Python.☆109Updated 2 months ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Template for sending a GitHub webhook over a zero trust, private network based on https://github.com/openziti/ziti☆59Updated 2 years ago
- Azure as an external process source for psDoom-ng☆85Updated 2 years ago
- Simple inbound/outbound packet sniffer☆31Updated 11 months ago
- Make bar charts on the terminal.☆90Updated 4 years ago
- Unix-style filesystem-based RSS/Atom/JSON Feed fetcher/reader☆177Updated last month
- Kill orphan processes☆114Updated last year
- Git worktree navigator☆31Updated last year
- immutable backups so simple that unborkable☆66Updated 3 months ago
- ☆105Updated last year
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 7 months ago
- notice and prevent network egress☆85Updated 3 months ago
- Shell scripting for serverless☆140Updated 3 years ago
- Build Better Base Images☆71Updated 3 months ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 3 years ago
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- ☆225Updated 6 months ago
- TideCloak lets your users hold their own digital authority—no central control, no blind trust.☆64Updated last month
- this URL is also malicious(?!) shell script☆143Updated 5 months ago
- Top 500 DNS domains seen on the Quad9 recursive resolver array each day☆155Updated this week
- ☆15Updated 2 months ago
- Run containerized, rootless applications with podman☆122Updated 3 years ago
- LD_PRELOADable library for exploring the glibc heap☆107Updated 6 months ago