☆24Sep 12, 2024Updated last year
Alternatives and similar repositories for passport
Users that are interested in passport are comparing it to the libraries listed below
Sorting:
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- ☆19Jan 31, 2025Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- ☆21Jun 3, 2021Updated 4 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 9 months ago
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆17Mar 10, 2023Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- ☆27May 6, 2024Updated last year
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year
- Python code for doing k-Best or List decoding with the Viterbi algorithm☆18May 4, 2017Updated 8 years ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 11 months ago
- ☆23Sep 20, 2024Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Feb 24, 2026Updated last week
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 8 months ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago