agix / secretinLinks
Open source secret manager with sharing possibility based on webapi crypto http://www.w3.org/TR/WebCryptoAPI/
☆39Updated 8 years ago
Alternatives and similar repositories for secretin
Users that are interested in secretin are comparing it to the libraries listed below
Sorting:
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Certification Authority Trust Tracker☆126Updated 7 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Threatbutt Suite☆37Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Client API to query the Phishing Initiative service API☆23Updated last year
- ☆56Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- TLS labs☆30Updated 5 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 4 years ago
- ☆16Updated 9 years ago
- Chef cookbook for hardening macOS systems☆27Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Password analysis software☆37Updated 10 years ago
- builds database/visualizations of LAN structure from passively sifted information☆148Updated 11 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆132Updated 8 years ago
- ☆103Updated 4 months ago