GSSAPI/Kerberos proxy
☆32Apr 27, 2014Updated 11 years ago
Alternatives and similar repositories for gssapi-proxy
Users that are interested in gssapi-proxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell Utilities for Security Situational Awareness☆13Jan 10, 2017Updated 9 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Dec 27, 2025Updated 3 months ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- ☆29Nov 22, 2023Updated 2 years ago
- Sample code from Owning MS Outlook with Powershell☆60Dec 6, 2016Updated 9 years ago
- NTFS parser, plus linking capabilites between MFT LogFile and UsnJrnl☆38Aug 23, 2016Updated 9 years ago
- sandbox demo☆11Jan 18, 2024Updated 2 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Jun 2, 2024Updated last year
- An RSS reader built with Rust, Go and Typescript☆10Nov 15, 2025Updated 4 months ago
- A simple and efficient MsgPack binary serialization library in a self-contained header file☆89Apr 3, 2019Updated 7 years ago
- A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.☆78Oct 15, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Use PowerShell DSC resources as imperative functions.☆11Sep 30, 2017Updated 8 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- ☆98Jun 20, 2022Updated 3 years ago
- ☆39Apr 23, 2024Updated last year
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Auto install WinPcap on Windows(command line)☆54Jul 18, 2017Updated 8 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Apr 2, 2026Updated last week
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- My software engineering notes.☆24Nov 12, 2025Updated 4 months ago
- ☆16Nov 10, 2018Updated 7 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- Youtube channel sample code☆58Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A simple port forwarding utility for TCP and UDP☆14Oct 7, 2013Updated 12 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- WER Server☆19Feb 26, 2017Updated 9 years ago
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Simple NGram Fast Indexer & Searcher☆37Jan 6, 2023Updated 3 years ago