a-dma / yubotpLinks
Yubico OTP validation Slack bot
☆10Updated 3 months ago
Alternatives and similar repositories for yubotp
Users that are interested in yubotp are comparing it to the libraries listed below
Sorting:
- ☆15Updated 3 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- Effective filter to prevent weak passwords. Tests actual attacks used by crackers.☆19Updated 2 months ago
- Generic Identity Device Specification Applet☆109Updated 2 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated 2 years ago
- Online explorer for the FIDO Metadata Service☆27Updated this week
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Updated 3 months ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Updated 12 years ago
- Generic ASN.1 decoder/encoder to a structured text syntax☆50Updated 4 years ago
- Network Cryptography Monitor - using eBPF, written in python☆42Updated 4 months ago
- Project Gutenberg Australia word lists☆14Updated 4 years ago
- Test tool for CTAP2 authenticators☆56Updated 2 years ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆78Updated 4 months ago
- A tool to help you understand TPM commands and responses.☆47Updated last year
- Cryptanalysis and attack library☆22Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 4 years ago
- A Common Criteria (CC) and FIDO certified FIDO U2F javacard applet.☆21Updated 4 years ago
- DFF (Digital Forensics Framework)☆11Updated 5 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated 2 months ago
- Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆48Updated 3 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆41Updated last month
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- A GUI application for managing Solo v2 security keys☆11Updated last week
- CryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers…☆43Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated 2 years ago