nicolas-thill / hostilewrtLinks
An embedded wireless security audit system
☆21Updated 12 years ago
Alternatives and similar repositories for hostilewrt
Users that are interested in hostilewrt are comparing it to the libraries listed below
Sorting:
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Updated 6 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 5 months ago
- Perl library for SHODAN☆17Updated 11 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 11 years ago
- ☆11Updated 4 years ago
- Advanced FireWall cookbook for Chef and Linux that uses Iptables and to dynamically configure inbound and outbound rules on each node.☆40Updated 10 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆29Updated 9 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- ☆10Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Print core memory of a given a process ID (linux specific)☆11Updated 7 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆11Updated 9 years ago
- A passive network discovery tool that finds live network nodes by analyzing ARP and broadcast packets.☆12Updated 12 years ago
- Computer code for the Analysis of RF measurement data and generation of scenarios☆10Updated 7 years ago
- Modifies running processes on Linux☆25Updated 3 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated last week
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- a bot based on [suckless] ii, auto-managed by bash☆28Updated 13 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆10Updated 9 months ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- USB keyboard where keystrokes are end-to-end encrypted between the keyboard and dom0☆9Updated 6 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 7 months ago