☆24Sep 12, 2024Updated last year
Alternatives and similar repositories for passport
Users that are interested in passport are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 4 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆16Aug 8, 2019Updated 6 years ago
- AI fun☆27Feb 27, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆18Aug 31, 2018Updated 7 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆18Mar 10, 2023Updated 3 years ago
- Runtime smm module loader☆39Jan 12, 2023Updated 3 years ago
- Tool to archive RPM packages and attest to their authenticity☆14Jun 5, 2025Updated 11 months ago
- U2F/FIDO-based key derivation and encapsulation -- C implementation and command-line tool☆10Dec 16, 2025Updated 4 months ago
- ☆77Jul 12, 2025Updated 9 months ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆15Nov 28, 2024Updated last year
- Missing python minisign library☆21Apr 9, 2026Updated last month
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆12Oct 5, 2022Updated 3 years ago
- Resistance Core☆10Feb 15, 2021Updated 5 years ago
- Async test/bench toolkit including single stepping executors. No-std compatible.☆14Sep 19, 2021Updated 4 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆16Apr 28, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆19Jan 31, 2025Updated last year
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- ☆13Aug 21, 2023Updated 2 years ago
- Ansible Molecule demo for Network Automation☆14Jan 24, 2023Updated 3 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆56May 7, 2025Updated last year
- ☆12Sep 12, 2022Updated 3 years ago
- Resistance Miner☆14Feb 4, 2020Updated 6 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 5 months ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆44Mar 15, 2026Updated last month
- Determine Who Can Log In to an SSH Server☆29Jun 27, 2025Updated 10 months ago
- ☆11Feb 9, 2026Updated 3 months ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 9 years ago
- stream abstraction designed for use with nom☆14Jul 25, 2023Updated 2 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year