secretin / secretin-app
Open source secret manager with sharing capability
☆32Updated 2 years ago
Alternatives and similar repositories for secretin-app
Users that are interested in secretin-app are comparing it to the libraries listed below
Sorting:
- Build lib around secretin https://github.com/agix/secretin and migrate to the future !☆17Updated 2 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆55Updated last year
- The WooKey project manifest repository, use repo init -u https://github.com/wookey-project/manifest.git☆17Updated 3 years ago
- A Python framework for script filing and task sequencing☆26Updated 5 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆98Updated 3 months ago
- Writeups for CTF that took place in 2015.☆13Updated 9 years ago
- AD-control-paths LDAP submodule☆19Updated 6 years ago
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆34Updated 4 years ago
- IRMA frontend☆25Updated 8 years ago
- A RADIUS authentication server audit tool☆79Updated 6 years ago
- Configuration security audit framework☆23Updated 9 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- Certificate Expiration Monitor script☆27Updated 6 years ago
- WER Server☆18Updated 8 years ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Updated 7 years ago
- Collection of some personal markdown resources☆21Updated 6 years ago
- Open source secret manager with sharing possibility based on webapi crypto http://www.w3.org/TR/WebCryptoAPI/☆39Updated 7 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Updated 8 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 13 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 4 years ago
- ☆15Updated 7 years ago
- Active Directory Group Policy analyzer☆104Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- ☆68Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Breaking the security of Microsoft's RMS☆54Updated 5 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Updated 8 years ago