4ndronicus / credential-researchLinks
Research on the various credentials databases that have been dumped.
☆11Updated 7 years ago
Alternatives and similar repositories for credential-research
Users that are interested in credential-research are comparing it to the libraries listed below
Sorting:
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆15Updated 3 years ago
- Bram's steganographic framework☆490Updated 11 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Mac osx forensics tools☆11Updated 5 years ago
- ☆24Updated 3 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Access .onion sites without Tor Browser☆31Updated 8 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago
- LightText (LT) is a lightning wallet that allows you to send and receive bitcoin payments over the lightning network. LT is an SMS client…☆10Updated 6 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆51Updated 10 years ago
- A tool (and library) for TACKs☆29Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 8 years ago
- Searches for hidden files in local blockchain .DAT files.☆40Updated 8 years ago
- Zcash Vanity Address Generator☆24Updated 4 years ago
- This is Chrome extension for detecting CSRF vulnerabilities.☆10Updated 8 years ago
- A Blockchain And Smart Contract Based CTF☆17Updated 2 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Docker configs and build scripts.☆23Updated 10 years ago
- Perceptual Hashing Image Similarity Framework☆31Updated 6 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- a collection of teaching resources☆12Updated 7 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago