zenfish / ipmiLinks
IPMI stuff from DARPA work
☆74Updated 2 years ago
Alternatives and similar repositories for ipmi
Users that are interested in ipmi are comparing it to the libraries listed below
Sorting:
- ssltrace hooks an application's SSL libraries to record keying data of all SSL connections☆95Updated 10 years ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆108Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 11 months ago
- IPMI analysis tools☆96Updated 2 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Store 802.11 frames in Elasticsearch. Visualize with Kibana☆58Updated last year
- DHCP option injector☆42Updated 5 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 6 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Grab ssh keys from ssh-agent☆223Updated 5 years ago
- ☆24Updated 10 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated 2 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- BGP Hijack Detection☆115Updated 7 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 11 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆86Updated 3 years ago
- Parser for zebra/MRT BGP routes dumps.☆40Updated 8 years ago
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago
- ☆30Updated 10 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆63Updated 10 years ago
- CVE-2016-2776☆27Updated 8 years ago
- SI6 Networks' IoT Toolkit☆39Updated 7 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago