glv2 / bruteforce-luks
Try to find the password of a LUKS encrypted volume.
☆254Updated 11 months ago
Alternatives and similar repositories for bruteforce-luks:
Users that are interested in bruteforce-luks are comparing it to the libraries listed below
- Standalone password candidate generator using the PRINCE algorithm☆439Updated last year
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆256Updated last year
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆536Updated 8 years ago
- Private keys that have become public ...☆173Updated last week
- a more secure way to force programs to exclusively use tor network☆197Updated 2 years ago
- ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams☆72Updated 5 years ago
- ☆140Updated 8 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆168Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆228Updated 5 years ago
- Qt Port for Linux, Mac OSX and Windows☆297Updated 2 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Official python agent for using the distributed hashcracker Hashtopolis☆69Updated 6 months ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Updated 5 years ago
- ☆378Updated 12 years ago
- ☆123Updated 5 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆139Updated 2 years ago
- Word-generator based on per-position markov-chains☆174Updated last year
- coWPAtty: WPA2-PSK Cracking☆198Updated 6 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆694Updated last year
- Panic button for protection against cold boot attacks☆140Updated 3 years ago
- Gives you root on the hostOS, if you're a member of the 'docker' group.☆199Updated 4 years ago
- ☆113Updated 2 years ago
- Subgraph OS issues repository☆73Updated 8 years ago
- USB key cleaner☆459Updated last year
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 4 months ago
- Fetch, install and search exploit archives from exploit sites.☆111Updated last year
- NTP Main-in-the-Middle tool☆242Updated 2 years ago
- LibOTR functionality in Irssi.☆185Updated 7 years ago