glv2 / bruteforce-luksLinks
Try to find the password of a LUKS encrypted volume.
☆260Updated last year
Alternatives and similar repositories for bruteforce-luks
Users that are interested in bruteforce-luks are comparing it to the libraries listed below
Sorting:
- Automated Linux evil maid attack☆426Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- a more secure way to force programs to exclusively use tor network☆200Updated 3 years ago
- LibOTR functionality in Irssi.☆185Updated 7 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆703Updated last year
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆26Updated 7 years ago
- Blog-type notes about building Onion sites☆142Updated 7 years ago
- Onion delivery, so delicious☆204Updated 2 years ago
- ☆143Updated 8 years ago
- Vanguards help guard you from getting vanned...☆230Updated 11 months ago
- for the louise☆242Updated 4 years ago
- MAC spoofing with a restricted range of OUI prefixes☆70Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- ☆58Updated 8 months ago
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆112Updated last year
- A collection of various scripts I've written through the years☆67Updated 2 years ago
- Panic button for protection against cold boot attacks☆143Updated 3 years ago
- ☆126Updated 6 years ago
- Private keys that have become public ...☆178Updated 2 months ago
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆229Updated 2 years ago
- Gives you root on the hostOS, if you're a member of the 'docker' group.☆204Updated 5 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆139Updated 2 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆95Updated 7 years ago
- Nyancat in the MBR☆123Updated 12 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆144Updated last year
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆549Updated 8 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆172Updated 8 years ago
- ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams☆75Updated 6 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- Word-generator based on per-position markov-chains☆175Updated last year