bgraydon / lockview
A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a supporting tool for my DEF CON 28 talk on key space hacking - updated with interactive / moving elements to support my DEF CON 30 talk on moving elements.
☆16Updated 2 years ago
Alternatives and similar repositories for lockview:
Users that are interested in lockview are comparing it to the libraries listed below
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆30Updated 4 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Indicators of Normality☆12Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- The hidden mstsc recorder player☆28Updated 5 years ago
- Silly proof-of-concept for a PDF chatroom☆21Updated 2 years ago
- ☆39Updated 2 years ago
- Parser for Windows PowerShell script block logs☆13Updated 4 months ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆25Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Fuzz Network Traffic☆18Updated 4 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Updated 6 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago