sbcshop / PiTraffic
PiTraffic- Educational Traffic Light Add-on Shield HAT for Raspberry Pi
☆10Updated 5 years ago
Alternatives and similar repositories for PiTraffic:
Users that are interested in PiTraffic are comparing it to the libraries listed below
- Perl script to bruteforce SSH known_hosts files.☆25Updated 9 years ago
- Network Infrastructure Penetration Testing Tool☆10Updated 10 years ago
- C# SDK for SecureAuth IdP API☆11Updated last year
- This repo contains Powershell scripts used for general hackery.☆8Updated 9 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆11Updated 7 years ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆18Updated 4 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 12 years ago
- Service desk password tools.☆15Updated 7 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆61Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- PowerShell scripts for the PoshSec Framework☆22Updated 10 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Artefacts from various retefe campaigns☆10Updated 5 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆28Updated 9 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Updated last year
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15Updated 10 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 8 years ago
- Python pcap sanitizer☆21Updated 2 years ago
- ☆14Updated 4 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆15Updated 9 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29Updated last year
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Updated last year