Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets
☆48Jan 13, 2023Updated 3 years ago
Alternatives and similar repositories for entrust-identityguard-tools
Users that are interested in entrust-identityguard-tools are comparing it to the libraries listed below
Sorting:
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Feb 4, 2022Updated 4 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- CTF Write-ups☆27Apr 7, 2019Updated 6 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ☆15Aug 11, 2020Updated 5 years ago
- ☆16May 15, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Jul 26, 2022Updated 3 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- ☆17Jan 28, 2020Updated 6 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆100Mar 14, 2019Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Nov 1, 2019Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago