silentsignal / zsca
Zero-trust SSH CA
☆29Updated 6 months ago
Alternatives and similar repositories for zsca:
Users that are interested in zsca are comparing it to the libraries listed below
- generate pgp keys with vanity fingerprints☆17Updated 8 years ago
- A tool to help you understand TPM commands and responses.☆40Updated 3 months ago
- DNS Firewall Enforcer☆49Updated 5 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated 3 weeks ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Web of trust grapher☆39Updated last week
- A Passive SSH back-end and scanner.☆103Updated this week
- A local scanner for vulnerable web applications☆38Updated 3 weeks ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆40Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆15Updated 2 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- Import and display Masscan data☆35Updated 2 months ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆83Updated 4 years ago
- ☆37Updated 2 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- ☆25Updated 3 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆48Updated last month
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- USB armory - hardware control tool☆29Updated 3 weeks ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Some stuff about telecom security☆14Updated 9 years ago
- Go wrapper for awslabs/certlint☆25Updated 4 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- egrets monitors egress☆46Updated 4 years ago
- A PAM module to test passwords against previous leaks at haveibeenpwned.com☆34Updated 5 years ago