ludovicianul / geologLinks
Geolocation for SSH brute force attacks
☆30Updated 6 years ago
Alternatives and similar repositories for geolog
Users that are interested in geolog are comparing it to the libraries listed below
Sorting:
- Minion Frontend☆30Updated 6 years ago
- An admin webui for Sensu☆86Updated 9 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Updated 12 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆11Updated 9 years ago
- Script for doing evil stuff to Redis servers (for educational purposes only).☆70Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago
- Slack client used to encrypt/decrypt and send/receive Keybase PGP messages through a Slack private group.☆59Updated 9 years ago
- ☆56Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Certbot plugin that uses an external shell script for domain validation☆50Updated 7 years ago
- My Privoxy configuration files☆27Updated 13 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Updated 9 years ago
- Create a Twilio-powered device that keeps watch over dangerous and remote locations and alerts stakeholders of intrusions or safety conce…☆23Updated last year
- Semantic SSH RSA keys☆25Updated 11 years ago
- Low Frequency RFID check out/in client for Raspberry Pi☆65Updated 9 years ago
- Implements a router in the HTTP thread, one message per call.☆40Updated 8 years ago
- Pipe programs through decrypt to make your boss think you are l33t☆425Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- DEPRECATED: A Node.js daemon that interfaces with Vault and Warden to provide a secure method to deliver secrets to servers in the cloud.☆14Updated last year
- You'll never take me alive.☆86Updated 11 years ago
- A fake syskey app for dealing with those pesky tech support scammers☆16Updated 8 years ago
- A bot that'll monitor the number of followers of its followers and tweet when the counter gets to interesting values.☆13Updated 7 years ago
- Tools to make CI Packer builds awesome☆23Updated last year
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 3 years ago
- Security scanner to find temporary config files that contain passwords on public websites☆74Updated 13 years ago
- feature-rich, multi-database interfacing, multi-connection, colorful console-based SQL client☆56Updated 6 years ago
- Search for potential passwords/data leaks in a folder or git repo☆23Updated 6 years ago