cossacklabs / sestoLinks
Open source passwords (and secrets) manager for web
☆17Updated 9 years ago
Alternatives and similar repositories for sesto
Users that are interested in sesto are comparing it to the libraries listed below
Sorting:
- A small collection of scripts that I've written for various needs.☆29Updated 3 months ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Updated last year
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆79Updated 7 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- WaitList.dat Parser☆26Updated 7 years ago
- OSX Security Compliance & Hardening☆48Updated 10 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A tool to triage screenshots☆20Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- Repository for penetration testing tools☆36Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Network white noise collector☆19Updated 9 years ago
- Suite for Information gathering☆12Updated 7 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- ☆17Updated last year
- Truehunter☆31Updated 4 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 5 years ago
- A Security and Privacy Guide for non-technical users☆45Updated 10 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Convert MacOS plist password file to hash file for password crackers☆37Updated 6 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago