SecurityFail / kompromatLinks
Private keys that have become public ...
☆184Updated 3 weeks ago
Alternatives and similar repositories for kompromat
Users that are interested in kompromat are comparing it to the libraries listed below
Sorting:
- ☆147Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- a grep -r for secrets☆179Updated 3 years ago
- Summary and archives of leaked Russian TLD DNS data☆187Updated 8 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated last month
- ☆25Updated 8 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- ☆103Updated last week
- Automated Linux evil maid attack☆434Updated 10 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆119Updated 7 years ago
- service to check internet accessibility☆42Updated last year
- TLS Redirection☆119Updated 8 years ago
- Fast http dead file finder.☆217Updated 6 months ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- unhash is a set of tools designed to enable better password auditing☆120Updated 3 years ago
- Code Review Audit Script Scanner☆143Updated 3 months ago
- proxy poc implementation of STARTTLS stripping attacks☆169Updated 4 years ago
- ☆384Updated 13 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆399Updated 6 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆64Updated 8 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166Updated 2 years ago
- ☆198Updated 10 years ago
- Linux file read monitor☆91Updated 2 years ago
- AM radio data exfiltration with CPU cache in assembly☆20Updated 2 years ago
- Git manager for pentesters☆108Updated 9 years ago
- HORSEPILL rootkit PoC☆230Updated 9 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago