SecurityFail / kompromat
Private keys that have become public ...
☆173Updated 2 weeks ago
Alternatives and similar repositories for kompromat:
Users that are interested in kompromat are comparing it to the libraries listed below
- ☆140Updated 8 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- a grep -r for secrets☆178Updated 2 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆95Updated 7 years ago
- Code Review Audit Script Scanner☆140Updated last year
- TLS Redirection☆120Updated 7 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆127Updated last month
- ☆112Updated 7 years ago
- ☆198Updated 9 years ago
- Git manager for pentesters☆107Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- ☆104Updated 5 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆116Updated 6 years ago
- Big Iron Recon & Pwnage☆126Updated 3 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A DNS connectback shell executed by strings in payloads.txt☆103Updated last year
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆165Updated last year
- ☆103Updated last week
- Automated Linux evil maid attack☆426Updated 9 years ago
- New TLS Padding Oracles☆125Updated last year
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- ☆25Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- DNS zone transfer research☆58Updated 8 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Mass scanner for the Java serialize bug☆151Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago