unixist / randumbView external linksLinks
Naively estimate entropic probability
☆38Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for randumb
Users that are interested in randumb are comparing it to the libraries listed below
Sorting:
- Detect and prevent crypto malware as it encrypts files☆69Nov 13, 2021Updated 4 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated last month
- Open Source INTelligence☆24Apr 19, 2020Updated 5 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 4 months ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- A command line Hash Identifying tool.☆101Mar 17, 2019Updated 6 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Passive Vulnerability Auditor☆136Jul 26, 2016Updated 9 years ago
- HTTP Header Analysis Vulnerability Tool☆115Dec 20, 2020Updated 5 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆26Mar 14, 2016Updated 9 years ago
- ☆56Jul 19, 2017Updated 8 years ago
- recover deleted information from sqlite files.☆64Jun 17, 2016Updated 9 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- ☆66Sep 17, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- detects several virtualizations☆45Dec 29, 2015Updated 10 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Apr 2, 2018Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29May 7, 2017Updated 8 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- Control yours and others pishocks via VRChat OSC☆10May 17, 2024Updated last year
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- UEFI signing tools for Linux -- Forked to support AWS CloudHSM☆13Aug 25, 2021Updated 4 years ago
- A simple demo of Google Authenticator implementation with PHP. Use this to implement a 2-factor login on your website or application with…☆10Mar 25, 2015Updated 10 years ago
- General Use Timeseries Containers for Rust☆11Dec 31, 2020Updated 5 years ago