mricon / wotmate
Web of trust grapher
☆38Updated last week
Alternatives and similar repositories for wotmate
Users that are interested in wotmate are comparing it to the libraries listed below
Sorting:
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22Updated 11 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- ☆22Updated 7 years ago
- ☆15Updated 8 years ago
- CEF plugin for audisp (Linux Audit)☆23Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- ☆25Updated 7 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- ☆30Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- first commit☆20Updated last year
- An effective attack against the Argon2i hash function☆9Updated 7 years ago