autoapply / yaml-cryptLinks
Encrypt and decrypt YAML documents
β21Updated 2 years ago
Alternatives and similar repositories for yaml-crypt
Users that are interested in yaml-crypt are comparing it to the libraries listed below
Sorting:
- π² Forward SMS and calls from any SIM card to Slack.β31Updated 3 years ago
- transparent TCP-to-proxy redirectorβ16Updated 6 years ago
- CryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headersβ¦β43Updated 11 months ago
- Miscellanous code for interacting with car electronicsβ51Updated 10 months ago
- Android application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20β67Updated 4 years ago
- Platform independent Near Field Communication (NFC) libraryβ28Updated 4 years ago
- Quijote is an highly configurable HTTP middleware for API security.β47Updated 4 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.β31Updated 4 years ago
- Utility to scan for RTSP Sources on a networkβ23Updated 3 years ago
- Selective wifi jammer - control who can connect whereβ47Updated 8 years ago
- Secure File Transfer via Global Socket Bounce Networkβ25Updated 4 years ago
- Execute a shell command within Cloud Runβ30Updated 3 years ago
- The Swiss Army knife for backend engineers.β95Updated 4 years ago
- Passively scan for Bluetooth Low Energy devices and attempt to fingerprint themβ166Updated 2 years ago
- Clone network interface from one host as a tap interface on another hostβ61Updated 5 years ago
- A tiny Tor client implementation (in pure python).β133Updated 2 years ago
- Probe Request sniffer + Wigleβ79Updated 5 years ago
- Apple geolocation services reverse engineering. Database scraper.β64Updated 2 years ago
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devicesβ41Updated 2 years ago
- A local scanner for vulnerable web applicationsβ41Updated this week
- Contec Smart Home unauthorized user addedβ11Updated 7 years ago
- Create Containerized Clearnet Proxiesβ31Updated 6 years ago
- TCAP (MAP/CAP) transaction tracking for pcap filesβ28Updated last year
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what soβ¦β24Updated 4 years ago
- A method for building LinuxKit images for Docker-CE with custom kernels.β21Updated 2 years ago
- Simple websocket broadcaster implemented in Rustβ60Updated 2 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.β89Updated 3 years ago
- Visualize Wi-Fi signal strength over a geographic areaβ62Updated this week
- Providing accurate JSON and Python dicts about the many public information available about MNOβ81Updated last year
- WireGuard VPN Administration web interface for complex networksβ23Updated 4 years ago