4ndronicus / credential-researchLinks
Research on the various credentials databases that have been dumped.
☆11Updated 8 years ago
Alternatives and similar repositories for credential-research
Users that are interested in credential-research are comparing it to the libraries listed below
Sorting:
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆51Updated 10 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆15Updated 3 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Create Dashboards via Timelion API or via Import in Kibana 7.x and Elasticsearch 7.x with Python☆10Updated 4 years ago
- Mac osx forensics tools☆12Updated 5 years ago
- a collection of teaching resources☆12Updated 7 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- A OS X crypto ransomware PoC☆89Updated 10 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Updated last year
- LightText (LT) is a lightning wallet that allows you to send and receive bitcoin payments over the lightning network. LT is an SMS client…☆10Updated 6 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Docker configs and build scripts.☆23Updated 11 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- Zcash Vanity Address Generator☆24Updated 4 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- Bram's steganographic framework☆493Updated 11 years ago
- TOR Mail encrypted server for Hidden Services☆44Updated 9 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- The public key cryptography framework☆11Updated 8 years ago
- RADIO Mesh Network☆14Updated 7 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆20Updated 6 years ago
- Bitcoin Private Key Extractor☆36Updated 9 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago