unixist / randumbView external linksLinks
Naively estimate entropic probability
☆38Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for randumb
Users that are interested in randumb are comparing it to the libraries listed below
Sorting:
- Detect and prevent crypto malware as it encrypts files☆69Nov 13, 2021Updated 4 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Jul 20, 2017Updated 8 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated last month
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- ☆24Jul 6, 2015Updated 10 years ago
- Scenes from movies re-imagined as though there were in the terminal☆23Aug 10, 2017Updated 8 years ago
- A command line Hash Identifying tool.☆101Mar 17, 2019Updated 6 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Debian CVE Scanner is self-contained CVE scanner for DEBIAN distributions written in golang.☆30Apr 21, 2023Updated 2 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Passive Vulnerability Auditor☆136Jul 26, 2016Updated 9 years ago
- HTTP Header Analysis Vulnerability Tool☆115Dec 20, 2020Updated 5 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆26Mar 14, 2016Updated 9 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- ☆56Jul 19, 2017Updated 8 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- detects several virtualizations☆45Dec 29, 2015Updated 10 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Apr 2, 2018Updated 7 years ago
- Allows you to get past the waiting page of CloudFlare and do web requests☆30Aug 22, 2017Updated 8 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- General Use Timeseries Containers for Rust☆11Dec 31, 2020Updated 5 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago