Phildo / expandpassLinks
Implements a simple nested grammar for expanding passwords
☆160Updated 2 years ago
Alternatives and similar repositories for expandpass
Users that are interested in expandpass are comparing it to the libraries listed below
Sorting:
- This repository has been combined with mac-tracker project and no longer receives updates.☆574Updated 3 months ago
- ROCA: Infineon RSA key vulnerability☆487Updated last year
- Private keys that have become public ...☆183Updated last month
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆119Updated 7 years ago
- Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.☆138Updated 6 years ago
- Linux file read monitor☆91Updated 2 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated 3 months ago
- Blog-type notes about building Onion sites☆142Updated 8 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- ☆56Updated 8 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- Freely available cryptographic iconography☆66Updated 8 years ago
- a grep -r for secrets☆178Updated 3 years ago
- The USG is Good, not Bad☆402Updated 5 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆336Updated 8 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- ☆145Updated 9 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Updated last year
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Tool to verify DKIM signatures on an mbox of emails☆96Updated 7 years ago
- Transfer files from Air gapped machines using QR codes☆112Updated 4 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆304Updated last month
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆347Updated 2 years ago
- This project implements a data-driven password meter. Its effects on password security and usability were evaluated in the following publ…☆188Updated 4 years ago
- Reveal encrypted files stored on a filesystem.☆54Updated 6 years ago