pentagridsec / shreddy2Links
The Raspberry Pi storage scrub station for USB thumb drives.
☆22Updated 4 years ago
Alternatives and similar repositories for shreddy2
Users that are interested in shreddy2 are comparing it to the libraries listed below
Sorting:
- Convert gpsxml files to png files which can be opened in Qgis☆13Updated 9 years ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Updated last year
- Still point in moving world.☆49Updated 3 years ago
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆74Updated 3 months ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Updated 3 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 5 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated last year
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆12Updated last year
- Project Gutenberg Australia word lists☆14Updated 4 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆31Updated 2 years ago
- Arduino Leonardo compatible PHUKD library☆13Updated 7 years ago
- A simple yet beautiful phishing proxy.☆59Updated 4 years ago
- VoIP honeypot system☆21Updated last year
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Updated 3 months ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes☆51Updated 4 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Updated 4 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Library and applications for interfacing with eidc32 and intelli-m☆13Updated 4 years ago
- ☆37Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Updated 2 years ago