snare / scruffyLinks
Scruffy. The Janitor.
☆23Updated 4 months ago
Alternatives and similar repositories for scruffy
Users that are interested in scruffy are comparing it to the libraries listed below
Sorting:
- A web spider's worst nightmare.☆53Updated 12 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 14 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- IRMA frontend☆25Updated 8 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Check Diffie Hellman group prime parameter☆11Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- ☆17Updated 7 years ago
- ☆30Updated 10 years ago
- Web of trust grapher☆38Updated 2 weeks ago
- Python pcap sanitizer☆21Updated 2 years ago
- ☆15Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- lte security☆41Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- ☆9Updated 7 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆12Updated 10 years ago