Semantic SSH RSA keys
☆25Feb 25, 2014Updated 12 years ago
Alternatives and similar repositories for semantic-ssh-key
Users that are interested in semantic-ssh-key are comparing it to the libraries listed below
Sorting:
- A password generation inspired by xkcd☆17Oct 30, 2014Updated 11 years ago
- piku experiments with "build a web app fast" prototyping☆13Aug 21, 2021Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- LNURL cypherapp for cyphernode☆13Sep 23, 2025Updated 6 months ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Encrypt and decrypt text using AES-GCM☆12Jan 11, 2026Updated 2 months ago
- 分布式的sqlmapapi☆11Sep 9, 2016Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- A cli for the DNSimple v2 API.☆10Nov 11, 2017Updated 8 years ago
- A tool to create human-writable versions of your PGP paperkey backup.☆10Jul 4, 2022Updated 3 years ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Oct 8, 2021Updated 4 years ago
- ☆20Oct 2, 2024Updated last year
- This script wraps iwconfig and wpasupplicant with a dmenu-based UI and offers a CSV configuration solution.☆12Jun 20, 2012Updated 13 years ago
- GSM Sniffer☆39Oct 16, 2011Updated 14 years ago
- Set up your own ad-blocking DoH server☆21Aug 1, 2020Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Encrypt and inscribe your k-of-n multisig descriptor — recover with any k seeds.☆18Apr 4, 2025Updated 11 months ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- Stream any content(uncensored) from torrents to your machine without downloading the file!☆10Jun 4, 2021Updated 4 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Take your time, seriously.☆13May 9, 2025Updated 10 months ago
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- Scan web server for known webshell names and responses☆50Sep 12, 2016Updated 9 years ago
- Bitcoin and Litecoin testnet web wallet☆14Aug 25, 2018Updated 7 years ago
- Extract certain CSS selectors form (S)CSS code.☆13Jan 19, 2025Updated last year
- It's a lightweight, fast and reliable Sendmail milter that implements the Sender Policy Framework☆15Feb 3, 2026Updated last month
- Suckless daemons☆19Aug 5, 2015Updated 10 years ago
- ☆17Mar 8, 2026Updated 2 weeks ago
- Lockless allocator, derived from http://locklessinc.com/☆14May 18, 2017Updated 8 years ago
- ☆49Mar 31, 2016Updated 9 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Lister (Total Commander) plugin to view XML files☆18Dec 4, 2024Updated last year
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- Solution of Regex Crossword https://regexcrossword.com/☆11Jul 17, 2020Updated 5 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- ☆29Aug 7, 2025Updated 7 months ago