moyix / wdepy
Decryption utility for PGP Whole Disk Encryption
☆19Updated 3 years ago
Alternatives and similar repositories for wdepy:
Users that are interested in wdepy are comparing it to the libraries listed below
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- ☆15Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆25Updated 3 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- ☆18Updated 3 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 4 months ago
- ☆15Updated 3 months ago
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 7 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- This is a tool box for CIS Windows Hardening☆8Updated 8 months ago
- Secure Boot Definition Languag☆10Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- ☆11Updated 6 years ago
- Extract TLS metadata from connection in JSON format.☆16Updated 4 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 5 years ago
- ☆19Updated 7 years ago