credentials
Here are 190 public repositories matching this topic...
-
Updated
Mar 28, 2019 - Python
-
Updated
Apr 22, 2020 - C
-
Updated
Apr 15, 2019 - C++
-
Updated
Sep 5, 2018 - JavaScript
-
Updated
Jul 2, 2020 - JavaScript
Provide error codes
It'd be good to throw some error codes, as well as the message. Identifying the wrong decryption key right now is quite difficult because you need to compare the whole string.
-
Updated
Dec 22, 2017 - Python
-
Updated
Jan 20, 2020 - PowerShell
-
Updated
Jan 21, 2019 - Python
-
Updated
Jan 18, 2020 - PowerShell
-
Updated
Nov 18, 2018 - C
-
Updated
Apr 21, 2020 - Python
Empire has a persistence implant called Install-SSP (See #9) which already supports dropping password filter implants on compromised machines. Instead of creating a new persistence module we should leverage the existing module and embed the exfitration parameters inside the DLL.
This will require a custom build of the implant but should integrate more nicely.
We could optionally make a sma
-
Updated
Jun 30, 2020 - Rust
-
Updated
Mar 9, 2020 - Go
-
Updated
Nov 5, 2017 - Go
-
Updated
Dec 21, 2019 - C++
-
Updated
Jul 1, 2020 - Java
-
Updated
Feb 10, 2017 - Rust
-
Updated
Jul 6, 2017 - Rust
-
Updated
May 13, 2020 - Go
-
Updated
Jun 5, 2020 - Python
-
Updated
Feb 14, 2019 - Go
-
Updated
May 26, 2020 - Ruby
-
Updated
Apr 28, 2020 - Python
Improve this page
Add a description, image, and links to the credentials topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the credentials topic, visit your repo's landing page and select "manage topics."
Currently if I "aws-vault foobar" and don't have a foobar profile in my aws config file, a profile section will be added and written to the file. However, if I then /remove/ the credentials, the profile section remains despite being empty. The expected behavior from me would be that if the profile were still empty (that is, never filled with extra data by the user), then it would be removed.