Phildo / expandpassLinks
Implements a simple nested grammar for expanding passwords
☆161Updated 2 years ago
Alternatives and similar repositories for expandpass
Users that are interested in expandpass are comparing it to the libraries listed below
Sorting:
- ROCA: Infineon RSA key vulnerability☆489Updated 2 years ago
- Artifacts for the USENIX publication.☆58Updated 6 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated last week
- This repository has been combined with mac-tracker project and no longer receives updates.☆573Updated 5 months ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Linux file read monitor☆90Updated 2 years ago
- Private keys that have become public ...☆184Updated 3 weeks ago
- CERT Tapioca for MITM network analysis☆184Updated last year
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 7 years ago
- Tool to verify DKIM signatures on an mbox of emails☆96Updated 7 years ago
- INTERLOCK - file encryption and HSM front-end☆304Updated 3 weeks ago
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆547Updated 5 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.☆136Updated 6 years ago
- ☆56Updated 8 years ago
- a grep -r for secrets☆178Updated 3 years ago
- A medium interaction printer honeypot 🍯☆203Updated 2 years ago
- The USG is Good, not Bad☆402Updated 5 years ago
- WiFi Tracker Confuser☆64Updated 8 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆246Updated 8 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆105Updated 7 years ago
- NIST/NCCoE Mobile Threat Catalogue☆149Updated 4 months ago