Utility to attempt to find the passphrase of a GPG secret key
☆10May 23, 2024Updated last year
Alternatives and similar repositories for bruteforce-gpg
Users that are interested in bruteforce-gpg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- my knowledge of linux privilege escalation☆11Oct 14, 2023Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Scanner for Gitlab Security Mis-Configurations☆18Apr 16, 2023Updated 2 years ago
- Finally a easy way how to mass-deploy zabbix agent via GPO☆11Mar 18, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A modern Nmap automation library for Python☆18Apr 15, 2025Updated 11 months ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆26Nov 21, 2018Updated 7 years ago
- Brute-force AES-128 cracker in Python 2.7☆17Mar 4, 2017Updated 9 years ago
- Windows Event Log Killer☆12May 22, 2017Updated 8 years ago
- Tracking the history of the FARA data from https://www.justice.gov/nsd-fara☆16Aug 3, 2023Updated 2 years ago
- A Mail Server in a Vagrant sandbox☆13Sep 29, 2019Updated 6 years ago
- ☆20Jul 15, 2023Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Dockerfile and helper script for running ShogiGUI + YaneuraOu on Linux☆11Mar 25, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Extract the FEN out of images of chess, xiangqi, or shogi diagrams.☆18Mar 11, 2026Updated 2 weeks ago
- A template showing datalake pipelines using the serverless architecture☆11Apr 12, 2020Updated 5 years ago
- Repository for the home climate monitoring I built☆17Jul 9, 2019Updated 6 years ago
- Extract Valve VPK (V1 & V2) archives (and create V1 archives).☆25May 14, 2021Updated 4 years ago
- vim, tmux, zsh, git - My personal config☆12Jan 28, 2022Updated 4 years ago
- A tool library for riichi mahjong written in Rust, made mostly to be used as a WASM component.☆13Aug 29, 2025Updated 6 months ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 10 months ago
- ☆10Jan 30, 2021Updated 5 years ago
- Defines fundamental data types and functions☆12Dec 21, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆15Updated this week
- Repository for Knowledge Centre Articles☆19Jan 23, 2023Updated 3 years ago
- Fork of https://github.com/niklasf/fishnet Supports variants playable on https://www.pychess.org☆13Mar 5, 2026Updated 3 weeks ago
- An online grocery shopping application (Instacart clone)☆12Jan 23, 2018Updated 8 years ago
- Scripts to decloak Linux Loadable Kernel Module (LKM) stealth rootkits.☆35Sep 28, 2025Updated 5 months ago
- Various test fonts (OpenType, OpenType with TrueType GX variation extensions, Multiple Master) for testing implementations of font format…☆11Jun 25, 2025Updated 9 months ago
- Rust/Cargo configuration for Fish☆18Mar 1, 2026Updated 3 weeks ago
- Anki向け将棋局面ビジュアライザ☆13May 25, 2020Updated 5 years ago
- A tool to create human-writable versions of your PGP paperkey backup.☆10Jul 4, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple workflow to open Bookmarks from Microsoft Remote Desktop, based on https://github.com/ctwise/alfred-workflows/tree/master/remote-d…☆11Feb 24, 2021Updated 5 years ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Oct 8, 2021Updated 4 years ago
- ☆20Oct 2, 2024Updated last year
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Dec 23, 2025Updated 3 months ago
- Design Pattern Implementation☆10Feb 24, 2021Updated 5 years ago
- Counting fish using Raspberry Pi camera and OpenCV-Python☆16Feb 15, 2016Updated 10 years ago
- ☆10Oct 21, 2020Updated 5 years ago