ss23 / entrust-identityguard-toolsView external linksLinks
Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets
☆48Jan 13, 2023Updated 3 years ago
Alternatives and similar repositories for entrust-identityguard-tools
Users that are interested in entrust-identityguard-tools are comparing it to the libraries listed below
Sorting:
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Feb 4, 2022Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 6 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- ☆16Aug 11, 2020Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Jul 26, 2022Updated 3 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- ☆17Jan 28, 2020Updated 6 years ago
- A Telegram cleaning python script☆12Jul 15, 2021Updated 4 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- ☆17Apr 20, 2022Updated 3 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆100Mar 14, 2019Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Nov 1, 2019Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- bypass secure solutions in smart way☆18Dec 8, 2022Updated 3 years ago
- A reference of the different types of access control card readers and which countries they're commonly found in☆18Oct 19, 2022Updated 3 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Model-based fuzzing for dotnet core, based on FuzzDB attacks. Especially good for fuzzing HTTP-based services!☆21Jun 22, 2022Updated 3 years ago
- THUGS(red) DuckyScript payload collection - One of many sources for duckyscript payloads, one of the top 10 ways to collect OSINT informa…☆21Jul 19, 2022Updated 3 years ago