c-skills / passport
☆23Updated 7 months ago
Alternatives and similar repositories for passport:
Users that are interested in passport are comparing it to the libraries listed below
- DEbian Cve REproducer Tool☆24Updated last year
- Linux #rootkit and #malware revealer☆24Updated 9 months ago
- Detect and remove the presence of canary tokens☆20Updated last year
- Open Source eBPF Malware Analysis Framework☆48Updated 6 months ago
- ☆30Updated 4 months ago
- Sandbox samples and monitor them with kunai☆21Updated last week
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆22Updated 6 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 10 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 3 months ago
- ☆26Updated last year
- Hackers Don't Give A Shit☆16Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- A library for intercepting system calls☆76Updated 4 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆15Updated 3 months ago
- Rebuild of portspoof in GO with additional features.☆17Updated this week
- Qemuno Framework☆24Updated 2 years ago
- wordlists for password cracking☆27Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆52Updated 2 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Bitpixie exploitation PoC☆29Updated last month
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- ☆27Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- egrets monitors egress☆45Updated 5 years ago
- SOCKS for your subnet☆17Updated 2 years ago