osirislab / screwSSHLinks
A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally written by Boris Kochergin.
☆28Updated 11 years ago
Alternatives and similar repositories for screwSSH
Users that are interested in screwSSH are comparing it to the libraries listed below
Sorting:
- Fun with the TLS handshake☆31Updated 11 years ago
- ☆15Updated 8 years ago
- WordPress Honeypot☆34Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- ☆56Updated 7 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Flood Shield is a very fast http flood blocker☆30Updated 10 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 8 years ago
- Host files with DNS☆32Updated 9 years ago
- ☆27Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆10Updated 10 years ago
- Passive Bitcoin Project☆10Updated 9 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- "RansomPKP" proof of concept.☆11Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- ☆36Updated 12 years ago
- Go automated nmap scanner☆12Updated 6 years ago
- Quantum Insert/FoxAcid case study☆15Updated 8 years ago
- Check for HTTP Security Headers☆13Updated 9 years ago
- ☆26Updated 13 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago