rootkovska / qubes-diagramsLinks
Qubes OS architecture diagrams for use in articles, posts and docs
☆19Updated 8 years ago
Alternatives and similar repositories for qubes-diagrams
Users that are interested in qubes-diagrams are comparing it to the libraries listed below
Sorting:
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- python tor client☆27Updated 10 years ago
- ☆16Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- ☆25Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- DirBuster successor in Erlang☆37Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Updated 11 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- Linux Application Firewall☆58Updated 5 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- ☆30Updated 5 years ago
- SSTP VPN client for Linux☆18Updated 5 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- ☆12Updated 9 years ago