c-skills / passport
☆23Updated 7 months ago
Alternatives and similar repositories for passport:
Users that are interested in passport are comparing it to the libraries listed below
- DEbian Cve REproducer Tool☆23Updated last year
- Detect and remove the presence of canary tokens☆20Updated last year
- Bitpixie exploitation PoC☆22Updated 3 weeks ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- ☆55Updated 6 months ago
- Linux #rootkit and #malware revealer☆24Updated 8 months ago
- Keep it secret, keep it safe☆77Updated 2 months ago
- ☆36Updated 4 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Determine Who Can Log In to an SSH Server☆29Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆126Updated this week
- Signing-key abuse and update exploitation framework☆125Updated last week
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- ☆45Updated last year
- Qemuno Framework☆24Updated 2 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated this week
- YARI is an interactive debugger for YARA Language.☆88Updated 3 months ago
- egrets monitors egress☆45Updated 5 years ago
- ☆16Updated 9 months ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- ☆26Updated 11 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆56Updated this week
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 9 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Still point in moving world.☆51Updated 2 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Check security aspects of a second-level domain name.☆16Updated 10 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year