cngutierr / ErsatzPasswordView external linksLinks
☆26Jun 15, 2016Updated 9 years ago
Alternatives and similar repositories for ErsatzPassword
Users that are interested in ErsatzPassword are comparing it to the libraries listed below
Sorting:
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- A small collection of scripts that I've written for various needs.☆30Feb 2, 2026Updated 2 weeks ago
- Password analysis software☆38Jun 24, 2015Updated 10 years ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆26Dec 12, 2021Updated 4 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Analyze and modify hashcat .restore files☆33Nov 19, 2022Updated 3 years ago
- ☆42May 19, 2022Updated 3 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Some small network-related utilities☆34Sep 30, 2016Updated 9 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- ZipManager air native extension will zip or unzip large zip archives super fast using native process in threads supporting both Android a…☆11Aug 6, 2020Updated 5 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- A proof of concept that .Net code can live inside Docker. Contains baseimage for Mono