SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Loads environment variables from `.env` to `getenv()`, `$_ENV` and `$_SERVER` automagically.
Composer install helper outsourcing sensitive keys from the package URL into environment variables
You’re taking a lot of notes and need a solution to manage them i.e. put your knowledge base in one central place and being able to retrieve quickly information’s, display them nicely through the browser as a HTML page or a slideshow, export them in many file formats (docx, odt, pdf, txt, …). Sensitive information’s can be encrypted and notes can be edited online. Online demo: https://www.marknotes.fr | Stay informed, follow us on Facebook: https://www.facebook.com/marknotes789
PHPasswordPusher is a PHP port of the PasswordPusher project, which provides a more secure method for sharing sensitive information (like passwords) with others. It operates on the principal that using a soon-to-be-expiring link to retrieve sensitive information is better than having the sensitive information persist in email, chat, etc...
The PHP Simple Encryption library is designed to simplify the process of encrypting and decrypting data while ensuring best practices are followed. By default is uses a secure encryption algorithm and generates a cryptologically strong initialization vector so developers do not need to becomes experts in encryption to securely store sensitive data.
A demo vulnerable application for stealing sensitive information by abusing Google Chrome cache
Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This application can be used as a honey pot to detect when "users" have opened "honey" docuements in shares they should not have accessed, or it allows you to track sensitive confidential documents within the organisation to see if its being passed around to users not authorised to access the documents.