whackashoe / strobe
A mirror of strobe
☆13Updated 2 years ago
Alternatives and similar repositories for strobe:
Users that are interested in strobe are comparing it to the libraries listed below
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 11 years ago
- Alternative hexdump.☆15Updated 8 years ago
- Web of trust grapher☆39Updated 10 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A sleepy cron☆12Updated 7 years ago
- Puppet module for Auditd☆40Updated 4 years ago
- Identify web application versions☆18Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Library and tools to access LUKS Disk Encryption encrypted volumes☆36Updated 6 months ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- ☆21Updated 5 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 3 months ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- Semantic SSH RSA keys☆25Updated 10 years ago
- LD_PRELOAD hack to redirect connections to other ports☆42Updated 9 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆11Updated 8 years ago
- PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP …☆27Updated 11 years ago
- ☆30Updated 9 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆36Updated 5 years ago
- DNS Firewall Enforcer☆49Updated 5 years ago
- An overlay that verifies signed ELF binaries☆9Updated 9 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- advanced code generator for John the Ripper☆12Updated 6 years ago
- Extract TLS metadata from connection in JSON format.☆16Updated 4 years ago