tazjin / watchblobLinks
Connect to 2-factor WatchGuard VPNs on Linux with OpenVPN
☆15Updated 8 years ago
Alternatives and similar repositories for watchblob
Users that are interested in watchblob are comparing it to the libraries listed below
Sorting:
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- ☆15Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- ☆27Updated 8 years ago
- A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local network☆54Updated 8 years ago
- ☆27Updated 12 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- This chef cookbook provides security configuration for mysql.☆27Updated last week
- ☆25Updated 8 years ago
- Some useful scripts for penetration testing☆45Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago