Password management and cracking training
☆13Jul 15, 2025Updated 8 months ago
Alternatives and similar repositories for password-training
Users that are interested in password-training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 29, 2016Updated 10 years ago
- ☆29Feb 7, 2018Updated 8 years ago
- Scripts that we use for pentesting☆42Feb 24, 2017Updated 9 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- A tool to format in a very opinionated way HTML, XML and text containing XML snippets.☆11Updated this week
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Cosmic is a cloud orchestration platform☆11Jun 22, 2016Updated 9 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Command to run a dev-server, build etc. with OpenPGP. On top of webpack.☆11Aug 11, 2021Updated 4 years ago
- A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessmen…☆19Sep 29, 2017Updated 8 years ago
- ThreadsApp is a web application built with a purpose of helping people learn web application security.☆17Nov 22, 2024Updated last year
- Create a Docker image containing several security tools☆16Jun 18, 2025Updated 9 months ago
- Basic linter (validator) for Jenkinsfiles. Can easily be used in pre-commit hooks and the pre-commit framework☆17Jun 13, 2022Updated 3 years ago
- leaked prompts of GPTs☆12Nov 29, 2023Updated 2 years ago
- An online tool for building a thorough and well-supported Code of Conduct specific to a community's online and/or offline environment.☆20May 27, 2021Updated 4 years ago
- Extract BIOS ROM extensions and bitmap fonts (8x8, 8x14, 8x16)☆18Feb 2, 2024Updated 2 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- Demo files☆20Jun 3, 2022Updated 3 years ago
- SpamAssassin DecodeShortURLs plug-in repository☆31Jan 4, 2023Updated 3 years ago
- A template-based cluster provisioning system☆61Mar 4, 2023Updated 3 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last month
- Create a local connection and use your smartphone as remote control☆24Feb 22, 2019Updated 7 years ago
- Ansible role for building and installing VirtualBox guest additions☆19Sep 28, 2023Updated 2 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24May 10, 2025Updated 10 months ago
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago
- MOVED: now at https://opendev.org/x/k8s-cloud-provider☆12Sep 26, 2019Updated 6 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated last week
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- A GUI Visualization Toolkit☆62Nov 6, 2015Updated 10 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Mar 3, 2016Updated 10 years ago
- ☆14Feb 2, 2021Updated 5 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last month
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Code related with system programming (os, admin, etc.)☆13Jul 11, 2020Updated 5 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago