Phildo / expandpassLinks
Implements a simple nested grammar for expanding passwords
☆160Updated 2 years ago
Alternatives and similar repositories for expandpass
Users that are interested in expandpass are comparing it to the libraries listed below
Sorting:
- ROCA: Infineon RSA key vulnerability☆486Updated last year
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 7 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆576Updated 2 months ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- Tool to verify DKIM signatures on an mbox of emails☆96Updated 7 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- Blog-type notes about building Onion sites☆142Updated 7 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- Linux file read monitor☆90Updated last year
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated 2 months ago
- NIST/NCCoE Mobile Threat Catalogue☆149Updated last week
- Private keys that have become public ...☆182Updated last week
- Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.☆138Updated 6 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆335Updated 7 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Scan SSH ciphers☆161Updated last year
- ☆261Updated 7 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated 4 months ago
- Transfer files from Air gapped machines using QR codes☆111Updated 4 years ago
- The USG is Good, not Bad☆401Updated 5 years ago