blues-lab / totp-app-analysis-public
Security and Privacy Failures in Popular 2FA Apps
☆19Updated last year
Alternatives and similar repositories for totp-app-analysis-public:
Users that are interested in totp-app-analysis-public are comparing it to the libraries listed below
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆12Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- ☆15Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Open YARA scan- and search engine☆22Updated 2 months ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- HTTP discovery and change monitoring tool☆12Updated 2 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- ☆16Updated 9 months ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Jast (Just Another Screenshot Tool)☆10Updated 5 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated last year
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆17Updated 2 months ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago