SecurityFail / kompromat
Private keys that have become public ...
☆173Updated this week
Alternatives and similar repositories for kompromat:
Users that are interested in kompromat are comparing it to the libraries listed below
- ☆140Updated 8 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆256Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- TLS Redirection☆120Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated last year
- a grep -r for secrets☆176Updated 2 years ago
- Internet data acquisition☆149Updated 4 years ago
- Code Review Audit Script Scanner☆140Updated last year
- A collection of scripts that help handling X.509 certificate and TLS issues☆127Updated this week
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- ☆104Updated 5 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆95Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆164Updated last year
- ☆112Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 3 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- New TLS Padding Oracles☆124Updated last year
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆245Updated this week
- (extensible) Data Exfiltration Toolkit (DET)☆158Updated 5 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆123Updated 7 years ago
- a tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain☆195Updated last year
- ☆198Updated 9 years ago