trimstray / mkchain
Open source tool to help you build a valid SSL certificate chain.
☆363Updated 2 months ago
Alternatives and similar repositories for mkchain:
Users that are interested in mkchain are comparing it to the libraries listed below
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆489Updated 2 months ago
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.☆273Updated 2 months ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- Vulnerability scanner based on vulners.com audit API☆200Updated 6 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆790Updated 3 years ago
- A UNIX security auditing tool based on several security frameworks☆311Updated 6 months ago
- CERT Tapioca for MITM network analysis☆182Updated 8 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 3 months ago
- DNS tool - display information about your domain☆354Updated last year
- MAC address age tracking☆576Updated this week
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆576Updated 6 months ago
- Hamburglar -- collect useful information from urls, directories, and files☆317Updated 2 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆102Updated 5 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆372Updated 3 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,196Updated 6 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 4 years ago
- ☆350Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆595Updated 7 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,599Updated 2 months ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Merge multiple pcap files together, gracefully.☆214Updated 2 months ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆325Updated last year
- Graphpath generates an ASCII network diagram from the route table of a Unix/Linux☆394Updated 3 years ago
- DevSec SSH Baseline - InSpec Profile☆284Updated 5 months ago
- Git Repository Analyzer.☆147Updated 7 years ago
- Local Privilege Escalation☆205Updated 7 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago