snare / scruffy
Scruffy. The Janitor.
☆23Updated this week
Alternatives and similar repositories for scruffy:
Users that are interested in scruffy are comparing it to the libraries listed below
- A web spider's worst nightmare.☆52Updated 12 years ago
- ☆30Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆77Updated 5 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- passive downloading☆13Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆96Updated 3 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A simple, but damn fast sinkhole☆64Updated last month
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- IRMA frontend☆25Updated 8 years ago
- F-Secure Virus World Map / Console Edition☆70Updated 11 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- ☆9Updated 7 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- Web of trust grapher☆39Updated 10 months ago
- ☆13Updated 10 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago