rootkovska / qubes-diagramsLinks
Qubes OS architecture diagrams for use in articles, posts and docs
☆19Updated 8 years ago
Alternatives and similar repositories for qubes-diagrams
Users that are interested in qubes-diagrams are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- python tor client☆27Updated 10 years ago
- The web site☆14Updated 2 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- ☆12Updated 8 years ago
- Post Exploitation Linux Toolkit☆20Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Command-line utility to control Tor.☆89Updated last year
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Next Generation of White Chapel☆21Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- ☆25Updated 10 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 11 years ago