thialfihar / semantic-ssh-keyLinks
Semantic SSH RSA keys
☆25Updated 11 years ago
Alternatives and similar repositories for semantic-ssh-key
Users that are interested in semantic-ssh-key are comparing it to the libraries listed below
Sorting:
- Command-line utility to control Tor.☆89Updated last year
- ☆30Updated 10 years ago
- Auto backup your github stars and repos☆13Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Host files with DNS☆33Updated 9 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with co…☆25Updated 12 years ago
- Web of trust grapher☆38Updated 4 months ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 4 years ago
- Packet-o-matic NG !☆64Updated 4 months ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Updated 7 years ago
- apbleed☆24Updated 11 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Updated 10 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 5 years ago