snare / scruffyLinks
Scruffy. The Janitor.
☆23Updated 10 months ago
Alternatives and similar repositories for scruffy
Users that are interested in scruffy are comparing it to the libraries listed below
Sorting:
- A web spider's worst nightmare.☆54Updated 13 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Use security tools from within IRC.☆24Updated 13 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- IRMA frontend☆25Updated 9 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Linux Application Firewall☆58Updated 5 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Scapy hands-on at #GreHack16☆15Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- ☆27Updated 8 years ago
- Packet-o-matic NG !☆64Updated 6 months ago
- Password analysis software☆37Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Configuration security audit framework☆21Updated 9 years ago