msimerson / sentryLinks
Bruteforce attack blocker (ssh, FTP, SMTP, and more)
☆65Updated 4 years ago
Alternatives and similar repositories for sentry
Users that are interested in sentry are comparing it to the libraries listed below
Sorting:
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- builds database/visualizations of LAN structure from passively sifted information☆148Updated 11 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Nmap NSE script that captures a screenshot from the host(s) over VNC using vncsnapshot.☆35Updated 11 years ago
- Linux Application Firewall☆58Updated 5 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Updated 7 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Updated 7 months ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- ☆78Updated 10 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- A web spider's worst nightmare.☆53Updated 13 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 11 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- ☆56Updated 8 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago