moyix / wdepyLinks
Decryption utility for PGP Whole Disk Encryption
☆20Updated 4 years ago
Alternatives and similar repositories for wdepy
Users that are interested in wdepy are comparing it to the libraries listed below
Sorting:
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago
- A local scanner for vulnerable web applications☆41Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated last week
- Open YARA scan- and search engine☆25Updated 11 months ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- socat version 2☆10Updated 13 years ago
- Hostile Dropboxes Management☆26Updated 6 years ago
- ☆22Updated 5 years ago
- ☆15Updated 4 years ago
- THOR APT Scanner User Manual☆20Updated this week
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated last week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- RACF Database Parser☆11Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Silly proof-of-concept for a PDF chatroom☆20Updated 2 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- Network Traffic Fuzzer☆17Updated last year
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago