unprovable / PastyPassLinks
Browser agnostic extension that enables pasting into password fields...
☆15Updated 5 years ago
Alternatives and similar repositories for PastyPass
Users that are interested in PastyPass are comparing it to the libraries listed below
Sorting:
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- transparent TCP-to-proxy redirector☆16Updated 6 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- A tool to download all a user's twitter followers☆24Updated 9 years ago
- A collection of crackmes☆40Updated 11 months ago
- Network white noise collector☆19Updated 9 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 8 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 5 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Updated 3 years ago
- Learning about disassembling☆20Updated 6 years ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- Archive of OCR'd tweets from Cesar Sayoc - A.K.A. the "MAGA bomber"☆10Updated 7 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Updated 2 months ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- WaitList.dat Parser☆26Updated 7 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Updated 4 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- Test Suite for John the Ripper☆25Updated 2 weeks ago