mricon / wotmateLinks
Web of trust grapher
☆38Updated this week
Alternatives and similar repositories for wotmate
Users that are interested in wotmate are comparing it to the libraries listed below
Sorting:
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22Updated 11 years ago
- Host files with DNS☆32Updated 9 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Updated 9 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago
- ☆30Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆15Updated 8 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆30Updated 6 years ago
- intel amt honeypot☆18Updated 8 years ago
- ☆15Updated 5 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- ☆25Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆9Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- ☆22Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Parallel APK analyzer☆51Updated 8 years ago