rootkovska / qubes-diagramsLinks
Qubes OS architecture diagrams for use in articles, posts and docs
☆18Updated 8 years ago
Alternatives and similar repositories for qubes-diagrams
Users that are interested in qubes-diagrams are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- ☆12Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- ☆24Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- python tor client☆27Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- A collection of shellcodes☆70Updated 13 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- The Swiss army knife of byte manipulation☆44Updated 9 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- ☆35Updated 13 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- A library for efficient interception of established TCP connections☆20Updated 10 years ago
- DirBuster successor in Erlang☆37Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago