silentsignal / zscaLinks
Zero-trust SSH CA
☆29Updated last month
Alternatives and similar repositories for zsca
Users that are interested in zsca are comparing it to the libraries listed below
Sorting:
- Some stuff about telecom security☆15Updated 9 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated last month
- Paused mirror. Official repository at https://git.glasklar.is/system-transparency/core/stboot☆115Updated last year
- Source to www.draw.io☆97Updated 6 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆96Updated this week
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆53Updated last month
- A Passive SSH back-end and scanner.☆104Updated 3 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- Test ssh login key acceptance without having the private key☆217Updated 4 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- DNS Firewall Enforcer☆50Updated 6 years ago
- A Linux netfilter conntracking module that understands TLS records☆32Updated 11 years ago
- A simple LD_PRELOAD library to disable SSL certificate verification. Inspired by libeatmydata.☆181Updated 7 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- ☆128Updated 2 years ago
- A tool to help you understand TPM commands and responses.☆47Updated 10 months ago
- A local scanner for vulnerable web applications☆40Updated 3 months ago
- PKI support for SSH certificates☆61Updated 4 years ago
- Signing-key abuse and update exploitation framework☆130Updated 4 months ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆306Updated 8 months ago
- ☆37Updated 4 years ago
- a set of simple steps to get from "I don't know WTF BBQ" to "I am service provider"☆53Updated last year
- egrets monitors egress☆46Updated 5 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 3 years ago
- ☆23Updated last year
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆134Updated last year
- random dissectors☆67Updated 2 years ago
- Determine Who Can Log In to an SSH Server☆29Updated 3 months ago