snare / scruffyLinks
Scruffy. The Janitor.
☆23Updated 9 months ago
Alternatives and similar repositories for scruffy
Users that are interested in scruffy are comparing it to the libraries listed below
Sorting:
- A web spider's worst nightmare.☆54Updated 13 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆80Updated 6 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- F-Secure Virus World Map / Console Edition☆70Updated 12 years ago
- Extract useful information from a Twitter account.☆35Updated 11 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- IRMA frontend☆25Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Certificate Expiration Monitor script☆27Updated 7 years ago
- ☆48Updated 9 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Web of trust grapher☆38Updated 5 months ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 6 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 14 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 3 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆38Updated 10 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago