kushaldas / unoon
☆33Updated 2 years ago
Alternatives and similar repositories for unoon:
Users that are interested in unoon are comparing it to the libraries listed below
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- ☆13Updated 4 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Updated 5 years ago
- Web of trust grapher☆38Updated last month
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Containers with systemd-nspawn☆23Updated last month
- Hash-based password manager☆19Updated 5 years ago
- Mini CA☆12Updated 9 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Version control repository manager☆12Updated 7 years ago
- Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.…☆28Updated 3 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆34Updated 5 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Pong revolution.☆13Updated 5 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- experimental threat modeling tools☆14Updated 2 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- USB keyboard where keystrokes are end-to-end encrypted between the keyboard and dom0☆9Updated 6 years ago
- ☆14Updated 6 years ago
- Hardened debian linux baseimage for Docker.☆40Updated 2 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago