gentilkiwi / kirandomtpmView external linksLinks
Get random bytes from the TPM (tool + BCrypt RNG provider)
☆17Nov 3, 2020Updated 5 years ago
Alternatives and similar repositories for kirandomtpm
Users that are interested in kirandomtpm are comparing it to the libraries listed below
Sorting:
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆62Jul 31, 2016Updated 9 years ago
- CVE-2020-0601 #curveball - Alternative Key Calculator☆78Jan 20, 2020Updated 6 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Nov 12, 2018Updated 7 years ago
- quotes i like.☆16Aug 1, 2019Updated 6 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 2 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- A malicious BGP daemon that forces a TCP zero window edge case☆20Apr 21, 2021Updated 4 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Documation repository for the documantation of my Community projects☆11Sep 3, 2024Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago