a-dma / yubotp
Yubico OTP validation Slack bot
☆10Updated 6 months ago
Alternatives and similar repositories for yubotp:
Users that are interested in yubotp are comparing it to the libraries listed below
- ☆15Updated 2 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated 2 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Online explorer for the FIDO Metadata Service☆22Updated this week
- ☆14Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- PKCS #11 utility tool☆13Updated 5 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Facial Recognition and Steganography☆10Updated 5 years ago
- OCSP Responder monitor☆34Updated 8 months ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- ☆32Updated 4 years ago
- Test tool for CTAP2 authenticators☆56Updated last year
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 9 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Sniffs sensitive data from interface or pcap☆15Updated 7 years ago
- ☆16Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated last year
- Home for explainer documents originated by the Microsoft Identity Standards team☆16Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- The Paper Artifact Availability☆21Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- apbleed☆24Updated 10 years ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- Repository for the CA/Browser Forum Code Signing Certificate Chartered Working Group☆24Updated last week