whackashoe / strobeLinks
A mirror of strobe
☆12Updated 2 years ago
Alternatives and similar repositories for strobe
Users that are interested in strobe are comparing it to the libraries listed below
Sorting:
- Files compiled from the Logica breach investigation materials☆44Updated 7 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- Web of trust grapher☆38Updated 2 months ago
- Recon system hardening scanner☆47Updated 8 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆87Updated 11 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 10 months ago
- Vulnerability scanner for OFX servers☆31Updated last year
- ld_preload userland rootkit☆35Updated 4 years ago
- detects several virtualizations☆45Updated 9 years ago
- ☆56Updated 8 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- The purpose of kernel checker is to determine if: newer kernel is available, if update / reboot is needed, if KernelCare (http://kernelca…☆16Updated 4 years ago
- A local scanner for vulnerable web applications☆40Updated 2 months ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 5 years ago
- sign elf binaries with GPG☆17Updated 8 years ago
- experimental and very fast implementation of a grep☆261Updated 2 years ago
- Quantum Insert/FoxAcid case study☆15Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 12 years ago
- Mainframe bruter and screen automation utility.☆43Updated 10 years ago
- Identify web application versions☆18Updated 8 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆16Updated 7 years ago
- ☆15Updated 8 years ago
- Convert a list of IP addresses/ranges to their minimized cidr form☆38Updated 10 years ago
- Tools to work with the pwnedkeys.com API☆10Updated 6 years ago