mricon / wotmateLinks
Web of trust grapher
☆38Updated 4 months ago
Alternatives and similar repositories for wotmate
Users that are interested in wotmate are comparing it to the libraries listed below
Sorting:
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆58Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- ☆16Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- DHCP option injector☆42Updated 5 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Conferences, tools, papers, etc.☆44Updated 3 weeks ago
- Network Defender Toolkit☆18Updated 12 years ago
- ☆56Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- CVE assignment documentation☆75Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- ☆13Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects