jwilk / git-landmineLinks
create local malicious git repo
☆51Updated 4 months ago
Alternatives and similar repositories for git-landmine
Users that are interested in git-landmine are comparing it to the libraries listed below
Sorting:
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 4 months ago
- Kill orphan processes☆114Updated last year
- ☆93Updated last year
- Make bar charts on the terminal.☆90Updated 4 years ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆79Updated 7 months ago
- Notify when YubiKey needs touch on macOS☆75Updated 2 months ago
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- this URL is also malicious(?!) shell script☆143Updated 4 months ago
- Unix-style filesystem-based RSS/Atom/JSON Feed fetcher/reader☆177Updated last month
- A web fuzzer using the httpipe format☆101Updated last year
- ☆106Updated last year
- Template for sending a GitHub webhook over a zero trust, private network based on https://github.com/openziti/ziti☆59Updated 2 years ago
- CLI based packet reader in Python.☆109Updated last month
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 6 months ago
- Build Better Base Images☆71Updated 2 months ago
- Shell scripting for serverless☆140Updated 3 years ago
- ☆225Updated 6 months ago
- Simple Saltstack-like deployment system in 2k lines of Python☆26Updated 5 months ago
- Git worktree navigator☆31Updated last year
- WIP - scripts for analyzing the (in)security of Chrome extensions☆27Updated last year
- Simple inbound/outbound packet sniffer☆31Updated 10 months ago
- a file transfer service utilizing quic☆66Updated 7 months ago
- notice and prevent network egress☆85Updated 2 months ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 3 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- TideCloak lets your users hold their own digital authority—no central control, no blind trust.☆64Updated 3 weeks ago
- RebootX On-Prem is an open source specification for defining a custom server in order to manage on-premise runnables and dashboards in th…☆101Updated this week
- immutable backups so simple that unborkable☆66Updated 2 months ago
- My investigation into mission generation in the Stealth Fighter games by Microprose.☆82Updated 7 months ago
- abcdesktopio documentation files markup language☆57Updated 3 weeks ago