aha-oida / aha-secretView external linksLinks
Share secrets encrypted
☆14Feb 3, 2026Updated last week
Alternatives and similar repositories for aha-secret
Users that are interested in aha-secret are comparing it to the libraries listed below
Sorting:
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆47Updated this week
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆91Jan 12, 2026Updated last month
- Repository of various practice part of subjects on BUT FEKT for BPC-IBE☆13Sep 19, 2021Updated 4 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- ☆13Feb 27, 2025Updated 11 months ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Install and manage the autosign gem, to faciliate puppet certificate policy autosigning☆11Jan 21, 2026Updated 3 weeks ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆11Aug 23, 2021Updated 4 years ago
- like ngrok but reverse☆13Aug 25, 2016Updated 9 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Print the uncompressed size of a GZip file.☆14Sep 16, 2019Updated 6 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- A small, simple and incomplete Lisp/Scheme interpreter written in Ruby☆11Mar 20, 2015Updated 10 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Debian Baseimages☆15Updated this week
- A Windows Bitcoin wallet password recovery tool☆11Nov 30, 2020Updated 5 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- Docker container to compile https://github.com/udacity/CarND-Capstone☆11Nov 3, 2017Updated 8 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Mar 27, 2021Updated 4 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 5 years ago
- Website dedicated to all things R and Databases☆15Sep 7, 2022Updated 3 years ago
- A package for accessing InfluxDB from Laravel 5.5+, based on configuration settings.☆13Mar 21, 2019Updated 6 years ago
- A program to check the security of personal passwords.☆12Jul 19, 2022Updated 3 years ago
- A bucket of tricks for automating CircleCI and Github☆15Mar 16, 2023Updated 2 years ago
- My Solutions to ABSOLUTE JAVA™ 6th Edition Global Edition☆21Jun 16, 2022Updated 3 years ago
- Cannahome source code and database☆12Feb 22, 2023Updated 2 years ago
- The Ranflood ransomware contrast tool☆17Dec 18, 2024Updated last year
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- Lightweight password strength checker that enforces a strong password policy.☆17Jan 3, 2023Updated 3 years ago
- systemd sockets for node.js applications☆13Jul 12, 2015Updated 10 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago