rootkovska / qubes-diagrams
Qubes OS architecture diagrams for use in articles, posts and docs
☆16Updated 7 years ago
Alternatives and similar repositories for qubes-diagrams:
Users that are interested in qubes-diagrams are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- python tor client☆27Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- ☆36Updated 12 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- Host files with DNS☆32Updated 9 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- ☆12Updated 8 years ago
- IRMA frontend☆25Updated 8 years ago
- See here:☆42Updated 12 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- ☆27Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Public resources NB shares☆18Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago