snare / scruffyLinks
Scruffy. The Janitor.
☆23Updated this week
Alternatives and similar repositories for scruffy
Users that are interested in scruffy are comparing it to the libraries listed below
Sorting:
- A web spider's worst nightmare.☆54Updated 13 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Linux Application Firewall☆58Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- Parallel APK analyzer☆51Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- ☆27Updated 8 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- python tor client☆27Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Updated 7 years ago
- Extract useful information from a Twitter account.☆35Updated 12 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 8 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago