SecurityFail / kompromat
Private keys that have become public ...
☆171Updated last week
Related projects ⓘ
Alternatives and complementary repositories for kompromat
- ☆140Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆255Updated 9 months ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- a grep -r for secrets☆176Updated 2 years ago
- ☆111Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆166Updated 2 years ago
- ☆198Updated 8 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 5 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆165Updated 7 years ago
- Automated Linux evil maid attack☆420Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆191Updated 9 years ago
- ☆25Updated 7 years ago
- TLS Redirection☆118Updated 7 years ago
- Code Review Audit Script Scanner☆140Updated last year
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆94Updated 6 years ago
- A DNS connectback shell executed by strings in payloads.txt☆101Updated last year
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆62Updated 6 years ago
- A collection of shell scripts that help handling X.509 certificate and TLS issues☆127Updated 7 months ago
- ☆235Updated 5 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 2 years ago
- Mass zone transfer python script☆15Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆241Updated 10 years ago
- Nameserver DNS poisoning attacks made easy☆516Updated 7 years ago
- Mass scanner for the Java serialize bug☆149Updated 5 years ago
- Big Iron Recon & Pwnage☆125Updated 3 years ago
- Perform timing attacks against web applications☆120Updated 5 years ago