snare / scruffy
Scruffy. The Janitor.
☆23Updated 3 months ago
Alternatives and similar repositories for scruffy
Users that are interested in scruffy are comparing it to the libraries listed below
Sorting:
- A web spider's worst nightmare.☆53Updated 12 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- ☆30Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- IRMA frontend☆25Updated 8 years ago
- Web of trust grapher☆38Updated last month
- Packet-o-matic NG !☆65Updated 9 months ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆77Updated 5 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆17Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Password analysis software☆37Updated 9 years ago
- Small EFI utility that clears the power-on and setup passwords in IBM x3550/x3650 M3 servers☆46Updated 4 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆37Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- ☆9Updated 7 years ago
- F-Secure Virus World Map / Console Edition☆70Updated 12 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago