lamby / ZeroCoolOSLinks
Live USB stick / ISO that plays the film «Hackers» on a continuous loop
☆37Updated 8 years ago
Alternatives and similar repositories for ZeroCoolOS
Users that are interested in ZeroCoolOS are comparing it to the libraries listed below
Sorting:
- This repository contains a step-by-step guide and sample configs how to turn a Raspberry Pi Zero-W into a portable companion device. Buil…☆125Updated 7 years ago
- Automated OpenSSH hardening☆42Updated 8 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆337Updated 8 years ago
- A monitoring service for Certificate Transparency☆32Updated 2 years ago
- Cleans out "open" wireless connections from OSX machine☆154Updated 5 years ago
- DHCP client disclosing less identifying information.☆61Updated 5 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- Configuration to use gpg smartcards for ssh authentication☆112Updated 4 years ago
- An opensource project similar to HoneyDocs☆26Updated 10 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 7 years ago
- Packet-o-matic NG !☆64Updated 4 months ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- Implements a simple nested grammar for expanding passwords☆161Updated 2 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- ☆39Updated 8 years ago
- Web of trust grapher☆38Updated 4 months ago
- Blog-type notes about building Onion sites☆142Updated 8 years ago
- ☆56Updated 8 years ago
- Subgraph Application Firewall☆106Updated 6 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- F-Secure Virus World Map / Console Edition☆70Updated 12 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆347Updated 2 years ago
- You'll Never Take Me Alive!☆234Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago