rootkovska / qubes-diagrams
Qubes OS architecture diagrams for use in articles, posts and docs
☆15Updated 7 years ago
Alternatives and similar repositories for qubes-diagrams:
Users that are interested in qubes-diagrams are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- python tor client☆26Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated last week
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆50Updated 3 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- post-exploitation tools☆15Updated 6 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- ArchPwn security linux live project☆19Updated 14 years ago
- Configures Whonix to run as a ProxyVM / AppVM on Qubes OS☆17Updated 9 years ago
- See here:☆42Updated 12 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- ☆27Updated 7 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- GNOME Shell aggregate system menu Tor indicator.☆5Updated 7 years ago