Showing entries 1-100 out of 672.
Two-factor authentication on the command line
A PC/SC driver for Linux/Mac OS X and it supports ACS CCID smart card readers
Tool to find misconfiguration through LDAP
Enumeration tool for Windows Active Directories
Correct bit errors in an AES key schedules
Locates 128-bit and 256-bit AES keys in a captured memory image
AES encrypting or decrypting pipe
Powerful fuzzer via genetic algorithms and instrumentation
A heavily enhanced version of AFL, incorporating many features and improvements from the community
Modern encryption tool with small explicit keys
A Ledger Nano plugin for age
TPM 2.0 plugin for age (This software is experimental, use it at your own risk)
YubiKey plugin for age
Age based repository file encryption gitops tool
A file and directory integrity checker
DNS brute force utility
Fast and customizable subdomain wordlist generator using DSL
Manage secret values in-repo via public key cryptography
Tool for analysing binaries
Tool to scan for Apache Tomcat server vulnerabilities
Tools for random password generation
Scanning APK file for URIs, endpoints and secrets
Automated decoding of encrypted text without knowing the key or ciphers used
An Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes…
Tool to generate commands for security and network tools
An implementation of Tor in Rust
Extract TOTP seed instead of using ArubaOTP app
Convert ASCII-armored PGP keys to animated QR code
Tool to gather network ranges using ASN information
Tool to execute Atomic Red Team tests (Atomics)
authoscopeauthoscope
Scriptable network authentication cracker
authoscopebadtouch
Scriptable network authentication cracker
Automated authorization test tool
AWS IAM credentials for Kubernetes authentication
The b2sum utility is similar to the md5sum or shasum utilities but for BLAKE2
BLAKE3 cryptographic hash function
Tool to do SSH spreading
HEX badchar generator for different programming languages
Operator Security Audit Tool
An implementation of BLAKE3 verified streaming
Bash shell-script implementation of SuperGenPass password generation
A man in the middle tool
Passwordless MFA identities for workforces, customers, and developers
Raw binary firmware analysis software
CLI to generate and inspect biscuit tokens
LDAP connector for Bitwarden
LDAP connector for Bitwarden
Crack legacy zip encryption with Biham and Kocher's known plaintext attack
RSA utility
Network protocol fuzzing tool
Tool to automatically sign git commits, replacing gpg for that purpose
Browserpass native client app
Cracks passwords of LUKS encrypted volumes
Tool to do brute-forcing from Nmap output
Patch-level verification for Bundler
Cross-Platform Passwords & Secrets Vault
Bitwarden Secrets Manager CLI
RTSP stream access tool
Crawler for URLs and endpoints
PC/SC driver for USB CCID smart card readers
Utility for encrypting and decrypting files and streams with AES-256
Container penetration toolkit
Creates CycloneDX Software Bill-of-Materials (SBOM) for your projects from source and container im…
Dump certificates from PE files in different formats
Intelligence tool to crawl the graph of certificate alternate names
Print x509 certificate info
Tools to bootstrap CAs, certificate requests, and signed certificates
Dump NTDS with golden certificates and UnPAC the hash
Custom wordlist generator
Tool for analysing CloudFormation templates
Cloudflare's PKI and TLS toolkit
An open-source tool for auditing your software supply chain stack for security compliance based on…
Rapidly Search and Hunt through Windows Forensic Artefacts
A CLI tool that helps you avoid undefined user behavior by validating your API specifications
chipsecchipsec
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework
Platform Security Assessment Framework