a-dma / yubotpLinks
Yubico OTP validation Slack bot
☆10Updated last month
Alternatives and similar repositories for yubotp
Users that are interested in yubotp are comparing it to the libraries listed below
Sorting:
- ☆15Updated 3 years ago
 - PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
 - A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆24Updated last month
 - details about DIAL protocol vulnerabilities☆30Updated last year
 - Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
 - Online explorer for the FIDO Metadata Service☆26Updated last week
 - Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated 2 months ago
 - Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆48Updated 2 years ago
 - Test tool for CTAP2 authenticators☆56Updated 2 years ago
 - Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
 - Checks for tpm vulnerabilities☆37Updated 2 years ago
 - ☆11Updated 4 years ago
 - Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated last year
 - ☆14Updated last year
 - Generic ASN.1 decoder/encoder to a structured text syntax☆49Updated 4 years ago
 - A USB armory based USB sandbox☆21Updated 8 years ago
 - Project Gutenberg Australia word lists☆14Updated 3 years ago
 - Cryptanalysis and attack library☆22Updated 3 years ago
 - Generic Identity Device Specification Applet☆109Updated last year
 - Salesforce Policy Deviation Checker☆30Updated 5 years ago
 - Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
 - Test Suite for John the Ripper☆25Updated 3 years ago
 - A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
 - A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
 - The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Updated 11 years ago
 - ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
 - ☆15Updated 4 years ago
 - See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆16Updated 7 years ago
 - Filesystems that cause an OS panic☆13Updated 5 years ago
 - A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago