-
https://github.com/activecm/
- NH, USA
Stars
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
A prototype malware C2 channel using x509 certificates over mTLS
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
Intrusion Detection Honeypot running NetCat in a bash script
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
This revolutionary software enables EV battery packs to be easily reused for stationary storage in combination with solar inverters
Cockpit is a web-based graphical interface for servers.
The Tulip Creative Computer - a portable Python synthesizer for music and graphics
ShellCheck, a static analysis tool for shell scripts
This is a simple program that accesses an MQTT server in which meshtastic routers publish messages and shows them on a gui.
A python script to translate Meshtastic packets into a plain format. Currently sends positions to a Traccar instance, and publishes battery % and environmental plugin data to its own topic (eg for …
Meshtastic MQTT exporter to Prometheus and Grafana (Dashboards included)
32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc
A BBS server for Meshtastic for posting bulletins, sending mail to users, and channel directory.
A POSIX *nix fetch script using Nerdfonts
🖼️ A command-line system information tool written in bash 3.2+
The Swiss Army Knife of System Recovery
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: https://datatracker.ietf.org/doc/draft-michel-ssh3/
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Repository for the SuperBIT Data Recovery System (a.k.a. the data drop capsule)
Detect Hostnames and enrich Zeek logs based on DHCP protocol
An E-Ink digital picture frame that gives images a natural aesthetic.