opsdisk / coresshLinks
Build a custom Core .iso operating system with a SSH server
☆13Updated 10 years ago
Alternatives and similar repositories for coressh
Users that are interested in coressh are comparing it to the libraries listed below
Sorting:
- Test Suite for John the Ripper☆24Updated 3 years ago
- Libvirt XML Files for Derivative Linux Distributions KVM - https://www.kicksecure.com/wiki/KVM / https://www.whonix.org/wiki/KVM☆9Updated last week
- Extract, defang, resolve names and IPs from text☆23Updated last year
- gives a fake chroot environment☆11Updated 11 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Checklists☆16Updated 8 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- CA Issuers Monitor (Authority Info Access)☆13Updated 2 years ago
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Wireshark regression tests☆11Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Go wrapper for kroeckx/x509lint☆14Updated 3 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- ☆10Updated 7 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Root Program parsers and SQL import script generators☆24Updated last month
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- A tool for parsing common ACPI tables☆14Updated 4 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 10 months ago