snare / scruffy
Scruffy. The Janitor.
☆23Updated 2 months ago
Alternatives and similar repositories for scruffy:
Users that are interested in scruffy are comparing it to the libraries listed below
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Web of trust grapher☆39Updated last week
- A web spider's worst nightmare.☆53Updated 12 years ago
- python tor client☆27Updated 9 years ago
- ☆30Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ☆9Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 13 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- free crypto audit☆31Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 9 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- x11log - a tiny, non-privileged local+remote keylogger for X11☆16Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year