osirislab / screwSSHLinks
A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally written by Boris Kochergin.
☆28Updated 12 years ago
Alternatives and similar repositories for screwSSH
Users that are interested in screwSSH are comparing it to the libraries listed below
Sorting:
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- LD_PRELOAD hack to redirect connections to other ports☆43Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- Remote FUSE filesystem via server-side script☆64Updated 10 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- Various tools related to SSL denial of service☆46Updated 11 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- A collection of shellcodes☆70Updated 13 years ago
- PPPoAT - PPP over Any Transport☆22Updated 4 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- ☆56Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Portable, light-weight ircd written in Go.☆53Updated 8 years ago
- QUANTUM-DNS server☆20Updated 6 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 10 years ago
- ☆35Updated 13 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago