snare / scruffyLinks
Scruffy. The Janitor.
☆23Updated last year
Alternatives and similar repositories for scruffy
Users that are interested in scruffy are comparing it to the libraries listed below
Sorting:
- A web spider's worst nightmare.☆54Updated 13 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- F-Secure Virus World Map / Console Edition☆70Updated 12 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Extract useful information from a Twitter account.☆35Updated 12 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Updated 11 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- Use security tools from within IRC.☆24Updated 13 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Updated 10 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆81Updated 6 years ago
- Threatbutt Suite☆37Updated 10 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago