cryptolok / EPMGLinks
Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords
☆22Updated 4 years ago
Alternatives and similar repositories for EPMG
Users that are interested in EPMG are comparing it to the libraries listed below
Sorting:
- Simple reverse ICMP shell☆41Updated 12 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Updated 7 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- An ARP Poisoning Defender script☆43Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 8 years ago
- ☆27Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago