glv2 / bruteforce-luks
Try to find the password of a LUKS encrypted volume.
☆255Updated last year
Alternatives and similar repositories for bruteforce-luks:
Users that are interested in bruteforce-luks are comparing it to the libraries listed below
- Qt Port for Linux, Mac OSX and Windows☆296Updated 2 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆139Updated 2 years ago
- NTP Main-in-the-Middle tool☆244Updated 3 years ago
- Private keys that have become public ...☆173Updated 3 weeks ago
- ☆141Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Automated Linux evil maid attack☆426Updated 9 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆695Updated last year
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- for the louise☆242Updated 4 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆170Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆142Updated 9 years ago
- This is a fork of the deDECTed.org project. Just making a few requested merges and changes.☆14Updated 9 years ago
- Word-generator based on per-position markov-chains☆174Updated last year
- ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams☆73Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆392Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆228Updated 2 years ago
- Standalone password candidate generator using the PRINCE algorithm☆443Updated last year
- ☆124Updated 5 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Try to find the password of a file that was encrypted with the 'openssl' command.☆223Updated 11 months ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Blog-type notes about building Onion sites☆143Updated 7 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 4 years ago
- The kernel patch and userspace tools to enable Linux software write blocking☆139Updated 4 years ago
- Nameserver DNS poisoning attacks made easy☆519Updated 8 years ago
- Volatility Framework plugin for extracting BitLocker FVEK (Full Volume Encryption Key)☆228Updated 8 years ago