jimfenton / rehash
Prototype private key hashing agent
☆16Updated 7 years ago
Alternatives and similar repositories for rehash:
Users that are interested in rehash are comparing it to the libraries listed below
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆30Updated 6 years ago
- bash script to download publicly available .svn directories☆16Updated 7 years ago
- Tools to work with the pwnedkeys.com API☆10Updated 6 years ago
- crypt(3) Standard DES password cracker for Ztex 1.15y FPGA board☆9Updated 8 years ago
- Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689☆18Updated last year
- ☆22Updated 6 years ago
- Web of trust grapher☆39Updated last week
- A script to automate Jenkins credential store decryption☆17Updated 6 years ago
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22Updated 10 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Content Security Policy report receiver and interactive policy builder (the code behind former CspBuilder.info)☆8Updated 3 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Android App that genereates passcode authentication codes for Postfinance cards☆10Updated 3 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- DHCP option injector☆42Updated 4 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- A CHaracter Aware Splitting Method for producing password candidates.☆41Updated 6 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- OpenPGP smart card minidriver☆11Updated 4 months ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆40Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago