mricon / wotmateLinks
Web of trust grapher
☆38Updated 2 months ago
Alternatives and similar repositories for wotmate
Users that are interested in wotmate are comparing it to the libraries listed below
Sorting:
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆15Updated 8 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆58Updated 6 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Command-line utility to control Tor.☆89Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 11 months ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆31Updated 7 years ago
- Linux Application Firewall☆58Updated 5 years ago
- ☆56Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 9 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 7 years ago
- DHCP option injector☆42Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Recon system hardening scanner☆47Updated 8 years ago
- Automated OpenSSH hardening☆42Updated 8 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago