mricon / wotmate
Web of trust grapher
☆39Updated 3 weeks ago
Alternatives and similar repositories for wotmate:
Users that are interested in wotmate are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 7 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- ☆30Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Does your library check TLS certificates properly?☆78Updated last year
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Host files with DNS☆32Updated 9 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22Updated 10 years ago
- Recon system hardening scanner☆47Updated 8 years ago
- ☆22Updated 6 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- intel amt honeypot☆18Updated 7 years ago
- ☆12Updated 8 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- ☆25Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- ☆13Updated 7 years ago