rootkovska / qubes-diagrams
Qubes OS architecture diagrams for use in articles, posts and docs
☆15Updated 7 years ago
Alternatives and similar repositories for qubes-diagrams:
Users that are interested in qubes-diagrams are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- ☆12Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Shellcodes for different usecases☆9Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- python tor client☆27Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- post-exploitation tools☆15Updated 6 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago