whackashoe / strobeLinks
A mirror of strobe
☆12Updated 3 years ago
Alternatives and similar repositories for strobe
Users that are interested in strobe are comparing it to the libraries listed below
Sorting:
- Web of trust grapher☆39Updated 7 months ago
- Files compiled from the Logica breach investigation materials☆45Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- detects several virtualizations☆45Updated 10 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- ☆30Updated 10 years ago
- File-tests is test-suite for File tool. Previous home: https://fedorahosted.org/file-tests/☆21Updated last month
- ☆56Updated 8 years ago
- DNS Firewall Enforcer☆50Updated 6 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Updated 8 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆81Updated 6 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆88Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 11 years ago
- ☆20Updated 6 years ago
- LD_PRELOAD hack to redirect connections to other ports☆44Updated 10 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Proof of concept for vulnerability management of Docker containers☆16Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆212Updated 9 months ago
- strings for a Linux process' address space☆51Updated 12 years ago
- A local scanner for vulnerable web applications☆41Updated this week
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- Public non-official repository of the famous ToneLoc wardialer☆50Updated 5 years ago
- Identify web application versions☆18Updated 8 years ago