SecurityFail / kompromatLinks
Private keys that have become public ...
☆183Updated this week
Alternatives and similar repositories for kompromat
Users that are interested in kompromat are comparing it to the libraries listed below
Sorting:
- ☆145Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆265Updated last year
- a grep -r for secrets☆178Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Summary and archives of leaked Russian TLD DNS data☆187Updated 8 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Code Review Audit Script Scanner☆141Updated 4 months ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆117Updated 7 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated 2 months ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated last year
- ☆25Updated 8 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- service to check internet accessibility☆42Updated last year
- Fast http dead file finder.☆218Updated 2 months ago
- ☆111Updated 8 years ago
- CANAPE Network Testing Tool☆184Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆397Updated 5 years ago
- Mass zone transfer python script☆16Updated 9 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Automated Linux evil maid attack☆432Updated 9 years ago
- TLS Redirection☆120Updated 7 years ago
- A framework for BREACH and other compression-based crypto attacks☆232Updated 5 years ago
- unhash is a set of tools designed to enable better password auditing☆120Updated 3 years ago
- HORSEPILL rootkit PoC☆228Updated 9 years ago
- ☆103Updated 3 months ago
- A Python framework for script filing and task sequencing☆26Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago