moyix / wdepyLinks
Decryption utility for PGP Whole Disk Encryption
☆19Updated 3 years ago
Alternatives and similar repositories for wdepy
Users that are interested in wdepy are comparing it to the libraries listed below
Sorting:
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago
- ☆15Updated 3 years ago
- Python CLI and module for CIRCL hash lookup☆14Updated 4 months ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- ☆19Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Monitor malware scanning services for your payloads☆11Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆25Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- all things awesome security☆12Updated 9 years ago
- RACF Database Parser☆11Updated last year
- Archive of Metasploit Framework v2 (Perl)☆16Updated 10 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- ☆18Updated 3 years ago
- ☆18Updated 2 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago