mullvad / windows-security
Node add-on to access security features on Windows
☆15Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for windows-security
- Scripts for building OpenVPN TAP adapter used in ProtonVPN Windows app☆14Updated 4 years ago
- ☆23Updated 2 years ago
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 4 years ago
- Decrypts Cisco VPN Group Passwords☆16Updated 12 years ago
- Find what's not loaded in memory on an executable (OS X/iOS only)☆9Updated 8 years ago
- App for controlling the DNSCrypt Proxy on Android☆9Updated 6 years ago
- CA Issuers Monitor (Authority Info Access)☆12Updated last year
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Wireshark regression tests☆10Updated 3 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Proof-of-concept web app built on top of Frida☆19Updated 9 years ago
- Build a custom Core .iso operating system with a SSH server☆12Updated 9 years ago
- A tool to extract code from individual functions in a library.☆15Updated 2 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 6 years ago
- Tool for UEFI Secure Boot DBX updates☆27Updated 2 years ago
- VBoxManage/vmrun proxy to allow communication from within a VM to the hypervisor running the VM.☆17Updated 6 years ago
- SNMP Backdoor Communication Channel☆15Updated 12 years ago
- ☆9Updated 6 months ago
- Root Program parsers and SQL import script generators☆21Updated 3 weeks ago
- Prevent Apple to mess with keys☆70Updated 11 years ago
- ☆10Updated 9 years ago
- Utility to generate a TLS Certificate.☆16Updated 4 years ago
- Test Suite for John the Ripper☆24Updated 2 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Mirai botnet credentials compiled for hydra☆18Updated 8 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated last year
- Grab functions from radare2☆10Updated 7 years ago
- ☆9Updated last year
- Example packet.proxy plugins.☆21Updated 3 years ago
- OSS-Fuzz - continuous fuzzing of open source software☆21Updated 2 years ago