featherduster
Pompem
featherduster | Pompem | |
---|---|---|
1 | 1 | |
1,058 | 939 | |
0.0% | - | |
0.0 | 10.0 | |
over 2 years ago | over 1 year ago | |
Python | Python | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
featherduster
-
Awesome CTF : Top Learning Resource Labs
FeatherDuster - An automated, modular cryptanalysis tool.
Pompem
-
guys please don't laugh, but..... can you debug your system?
Some security-scanners: Lynis, https://vuls.io/ , https://github.com/rfunix/Pompem , https://github.com/vulmon/Vulmap , cvescan, debsecan, cvechecker, openscap-scanner, more. See https://www.billdietrich.me/LinuxControls.html#SecurityTesting
What are some alternatives?
python-fpe - FPE - Format Preserving Encryption with FF3 in Python
BlackMamba - C2/post-exploitation framework
cryptg - Official Telethon extension to provide much faster cryptography for Telegram API requests.
cve_searchsploit - Search an exploit in the local exploitdb database by its CVE
TMOHS1-Root-Utility - An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several useful utilites to change the configuration of the device.
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
Crypton - Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Vulmap - Vulmap Online Local Vulnerability Scanners Project
peda - PEDA - Python Exploit Development Assistance for GDB
routersploit - Exploitation Framework for Embedded Devices
Backdoorcreator - Exploit toolkit
Lucifer - A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life