secretin / secretin-appLinks
Open source secret manager with sharing capability
☆32Updated 2 years ago
Alternatives and similar repositories for secretin-app
Users that are interested in secretin-app are comparing it to the libraries listed below
Sorting:
- Build lib around secretin https://github.com/agix/secretin and migrate to the future !☆17Updated 2 years ago
- Script created to get all the Hancitor C&C address [OLD]☆8Updated 6 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆98Updated 4 months ago
- The WooKey project manifest repository, use repo init -u https://github.com/wookey-project/manifest.git☆17Updated 4 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆55Updated last year
- ☆15Updated 7 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Updated 8 years ago
- A simple Ubuntu / Redhat / CentOS and Debian Audit Script☆9Updated 4 years ago
- Configuration security audit framework☆21Updated 9 years ago
- Client API to query the Phishing Initiative service API☆23Updated last year
- ☆68Updated 8 years ago
- Open source secret manager with sharing possibility based on webapi crypto http://www.w3.org/TR/WebCryptoAPI/☆39Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆34Updated 4 years ago
- AD-control-paths LDAP submodule☆19Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆10Updated 7 years ago
- ☆12Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆10Updated 9 years ago
- Certificate Expiration Monitor script☆27Updated 6 years ago
- A tool to triage screenshots☆19Updated 7 years ago
- Incident Response Scripts☆30Updated 5 years ago