rootkovska / qubes-diagramsLinks
Qubes OS architecture diagrams for use in articles, posts and docs
☆19Updated 8 years ago
Alternatives and similar repositories for qubes-diagrams
Users that are interested in qubes-diagrams are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Fast SSH server and open proxy scanner☆36Updated 6 months ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Updated 11 years ago
- DirBuster successor in Erlang☆37Updated 8 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- SSTP VPN client for Linux☆18Updated 4 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Linux Application Firewall☆58Updated 5 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 11 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 4 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago