A privilege escalation detection and prevention system for GNU/Linux hosts
-
Updated
Apr 28, 2012 - C
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A privilege escalation detection and prevention system for GNU/Linux hosts
Gulp! - A Blind SQL Injection Exploiter
The secure introduction introduces people using secured communication. It helps to share the public key, photo, phone number with a decentralized architecture.
A small tool to turn any entered passphrase into a strong secure password, allowing you to easily use different strong passwords for different websites without storing them
A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only
Set of small tools for managing AES encrypted credentials for powershell scripts
Command line tool to break weak RSA keys using Wiener's attack
PGP Private Key MINifier (secure backup)
a javascript static security analysis tool
Simple Powershell Reverse Shell with handling server in python
Man in the middle tool
Detect SSH connection attempts in real time using ptrace
BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for known vulnerabilities and major thing to do – testing to find unknown vulns. Also it can form nice statistics.
A stand-alone implementation of Hashcat's rule engine
512-bit block encryption algorithm, specially for x64
A Machine Learning approach for classifying a file as Malicious or Legitimate
Mac os x app finds ip address of hostname & PINGS