tothi / kali-rpi-luks-cryptView external linksLinks
Full disk encryption for Kali on Raspberry using LUKS
☆15Dec 13, 2020Updated 5 years ago
Alternatives and similar repositories for kali-rpi-luks-crypt
Users that are interested in kali-rpi-luks-crypt are comparing it to the libraries listed below
Sorting:
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Project the video stream of the Raspberry Pi camera onto a plane in A-Frame VR.☆10Jul 26, 2018Updated 7 years ago
- implementation of ADS-B protocol in ruby☆11Aug 31, 2021Updated 4 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Astro + Solid using Pocketbase to share Files and Snippets☆11Updated this week
- Radius Server for multifactor authentication (OTP and PUSH). Linux version.☆12Updated this week
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- ☆12Mar 10, 2024Updated last year
- ☆12Oct 10, 2024Updated last year
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Dec 1, 2025Updated 2 months ago
- Modern, fast and easy-to-use file manager for Xfce☆14Jul 26, 2012Updated 13 years ago
- Parse CTFd scoreboard into CTFtime JSON format.☆13Dec 1, 2025Updated 2 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆16Feb 13, 2024Updated 2 years ago
- Slides and material from my conference presentations☆16Mar 30, 2024Updated last year
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Mar 30, 2025Updated 10 months ago
- Browse the web entirely over SMS — no apps required.☆13Oct 6, 2014Updated 11 years ago
- Ergonomic python tooling for web3☆11Oct 2, 2023Updated 2 years ago
- ☆19Dec 18, 2024Updated last year
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Simple Docker image for OpenCanary in Python☆12Sep 10, 2025Updated 5 months ago
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- ☆17Jan 4, 2026Updated last month
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Wisper helps to maintain access to windows machine and have some other cool features like UAC Disable,Firewall Disable,Dumping Credential…☆15Apr 3, 2021Updated 4 years ago
- Arch Install Guide (BIOS + LUKS + BtrFS + LVM + GRUB)☆15Jun 4, 2024Updated last year
- Archive for acez.re blog.☆19Apr 17, 2023Updated 2 years ago
- ctf kernel pwn☆16Mar 21, 2024Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Parallel trading bot for Paradex and Backpack with multi-threading. Supports multiple accounts, monitoring LTV per trade, and stopping in…☆18Apr 2, 2025Updated 10 months ago
- ☆16Jun 22, 2020Updated 5 years ago
- Nyancat in your terminal!☆13May 29, 2018Updated 7 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Aug 19, 2025Updated 5 months ago
- ☆10Nov 3, 2021Updated 4 years ago
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerability☆18Mar 23, 2025Updated 10 months ago