c-skills / passportLinks
☆23Updated last year
Alternatives and similar repositories for passport
Users that are interested in passport are comparing it to the libraries listed below
Sorting:
- DEbian Cve REproducer Tool☆26Updated 2 months ago
- Still point in moving world.☆50Updated 2 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- ☆26Updated last year
- ☆16Updated 5 months ago
- Linux #rootkit and #malware revealer☆27Updated last year
- ☆34Updated 9 months ago
- ☆71Updated 2 months ago
- Userland exec PoC to be used as attack vector technique☆88Updated 2 weeks ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆89Updated 2 months ago
- Tail Certificate Transparency logs and extract hostnames☆124Updated 3 months ago
- egrets monitors egress☆46Updated 5 years ago
- Signing-key abuse and update exploitation framework☆130Updated 4 months ago
- Keep it secret, keep it safe☆78Updated 7 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 11 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated last month
- random dissectors☆67Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- ☆27Updated 3 years ago
- Detect and remove the presence of canary tokens☆23Updated last year
- ☆28Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- A library for intercepting system calls☆102Updated 8 months ago
- Toolkit for creating cryptographic figures and videos.☆33Updated last year
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆152Updated 2 weeks ago
- ☆55Updated 11 months ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆14Updated last week