whackashoe / strobeLinks
A mirror of strobe
☆12Updated 2 years ago
Alternatives and similar repositories for strobe
Users that are interested in strobe are comparing it to the libraries listed below
Sorting:
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆67Updated 14 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- Web of trust grapher☆38Updated 5 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- detects several virtualizations☆45Updated 9 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 7 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- 🖼 imgify - Convert any file to PNG and back.☆13Updated last month
- Crypt Breaker's Workbench☆18Updated 10 years ago
- Semantic SSH RSA keys☆25Updated 11 years ago
- upstream for seccheck☆15Updated 7 years ago
- ☆56Updated 8 years ago
- Vulnerability scanner for OFX servers☆32Updated last year
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 4 years ago
- Parser for zebra/MRT BGP routes dumps.☆40Updated 9 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆207Updated 6 months ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆36Updated 2 years ago
- sign elf binaries with GPG☆17Updated 9 years ago
- show which process did what DNS queries☆35Updated 7 years ago
- Command line utility for parsing certificates☆66Updated 4 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- ☆16Updated 9 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Recon system hardening scanner☆47Updated 9 years ago