SecurityFail / kompromat
Private keys that have become public ...
☆174Updated this week
Alternatives and similar repositories for kompromat:
Users that are interested in kompromat are comparing it to the libraries listed below
- ☆141Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- a grep -r for secrets☆179Updated 2 years ago
- CANAPE Network Testing Tool☆184Updated 7 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Code Review Audit Script Scanner☆140Updated last year
- Automated Linux evil maid attack☆426Updated 9 years ago
- ☆112Updated 7 years ago
- TLS Redirection☆120Updated 7 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- ☆25Updated 7 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆95Updated 7 years ago
- ☆198Updated 9 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated 2 months ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- Git manager for pentesters☆107Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- O-Saft - OWASP SSL advanced forensic tool☆378Updated last week
- Internet data acquisition☆149Updated 4 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- New TLS Padding Oracles☆125Updated last year
- DNS zone transfer research☆59Updated 8 years ago
- A DNS connectback shell executed by strings in payloads.txt☆105Updated last year
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆167Updated last year
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆116Updated 6 years ago
- HORSEPILL rootkit PoC☆226Updated 8 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆839Updated 2 months ago