mnagel / gnome-keyring-dumperLinks
dump passwords from gnome-keyring to stdout
☆41Updated 8 years ago
Alternatives and similar repositories for gnome-keyring-dumper
Users that are interested in gnome-keyring-dumper are comparing it to the libraries listed below
Sorting:
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- ☆59Updated 11 months ago
- Web of trust grapher☆38Updated 3 months ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆11Updated last year
- ☆23Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 4 months ago
- Tools for macOS Forensic Bootable media☆15Updated 5 years ago
- ☆46Updated 3 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆87Updated 11 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 11 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Fournir des ressources actionables de sécurité pour les services biomédicaux.☆11Updated 5 years ago
- Powerful Python tool to analyze PDF documents☆26Updated 3 years ago
- detects several virtualizations☆45Updated 9 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆36Updated 2 years ago
- File-tests is test-suite for File tool. Previous home: https://fedorahosted.org/file-tests/☆19Updated 3 months ago
- DFF (Digital Forensics Framework)☆11Updated 4 years ago
- IPv6 auto discovery tool☆90Updated 2 months ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Updated 6 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- 🖼 imgify - Convert any file to PNG and back.☆13Updated last year
- An open source software directory and release tracker.☆24Updated 2 months ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 6 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago