c-skills / passportView external linksLinks
☆23Sep 12, 2024Updated last year
Alternatives and similar repositories for passport
Users that are interested in passport are comparing it to the libraries listed below
Sorting:
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- U2F/FIDO-based key derivation and encapsulation -- C implementation and command-line tool☆10Dec 16, 2025Updated 2 months ago
- ☆18Jan 31, 2025Updated last year
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated last month
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Aug 31, 2018Updated 7 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- ☆21Jun 3, 2021Updated 4 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆17Mar 10, 2023Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆35Jan 17, 2013Updated 13 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Dec 12, 2023Updated 2 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- ☆26May 6, 2024Updated last year
- An improved algorithm for large scale OS fingerprinting☆19Jun 12, 2018Updated 7 years ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆22Feb 28, 2025Updated 11 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 10 months ago
- ☆23Sep 20, 2024Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- ☆76Jul 12, 2025Updated 7 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 7 months ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago