osirislab / screwSSHLinks
A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally written by Boris Kochergin.
☆28Updated 12 years ago
Alternatives and similar repositories for screwSSH
Users that are interested in screwSSH are comparing it to the libraries listed below
Sorting:
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- python tor client☆27Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- RESTful interface to your operating system shell☆19Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Remote FUSE filesystem via server-side script☆65Updated 10 years ago
- PPPoAT - PPP over Any Transport☆22Updated 4 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- WordPress Honeypot☆34Updated 7 years ago
- tox dns server☆44Updated 10 years ago
- Inject code into a running process☆120Updated 4 years ago
- Stochastic Traffic Factoring Utility☆15Updated 9 years ago
- ☆56Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Updated 12 years ago
- Naively estimate entropic probability☆38Updated 4 years ago
- miscellaneous scripts and things...☆21Updated 9 years ago