Information and build status for SubgraphOS Debian packages
☆19Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for subgraph-debian-packages
Users that are interested in subgraph-debian-packages are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Forked MaruOS installer for Nethunter☆17Feb 16, 2018Updated 8 years ago
- Go bindings for Carina™☆13Feb 6, 2017Updated 9 years ago
- ☆12Dec 30, 2020Updated 5 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- ☆12May 4, 2021Updated 4 years ago
- BlackArch menu, theme, and config for Fluxbox.☆17Mar 14, 2023Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Tools to work with the Anki Vector robot☆11Nov 21, 2020Updated 5 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆15Jan 11, 2020Updated 6 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 5 years ago
- ☆20Sep 19, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Research into potential vulnerabilities and risks of auto-generated pseudorandom passwords + Bluetooth Exploit.☆22Oct 24, 2018Updated 7 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 6 years ago
- A fork of Mozilla Lightbeam made for tracker research.☆13Nov 29, 2024Updated last year
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- This is the DJY nethunter kernel source code for Oneplus6 and 6T☆13Apr 7, 2024Updated last year
- With Media Converter you can easily convert .wmv, .mp4 ,.mp3 ,.mp4 ,.mkv ,.wma ,.m4a and .m4v to each other☆19Sep 22, 2016Updated 9 years ago
- ☆18Aug 2, 2022Updated 3 years ago
- ☆19Aug 21, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Firmware downloader for GoPro cameras (no registration needed)☆22Dec 8, 2018Updated 7 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 5 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- Perform code analysis to detect potentially dangerous vulnerabilities☆14Apr 16, 2024Updated last year
- Qubes component: app-linux-split-gpg☆26Feb 20, 2026Updated last month
- ☆13Feb 18, 2026Updated last month
- Short guides for preparing a Linux server to host web apps☆11Jul 28, 2015Updated 10 years ago
- A Simple C Reverse Shell☆22Jan 9, 2019Updated 7 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Kernel sources for the Pixel 4, Pixel 4 XL and Pixel 4a.☆19Jan 27, 2025Updated last year
- Differential Equations Guide☆14Jan 9, 2022Updated 4 years ago
- The missing contributions reporter for GitHub☆10Jan 26, 2022Updated 4 years ago
- A protovis visualization of the linked open data cloud.☆26Jul 25, 2011Updated 14 years ago
- ☆16Sep 27, 2018Updated 7 years ago