passkb
Whaler
Our great sponsors
passkb | Whaler | |
---|---|---|
2 | 4 | |
17 | 1,016 | |
- | - | |
0.0 | 0.0 | |
over 2 years ago | almost 2 years ago | |
Go | Go | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
passkb
-
Passkb: how to reliably and securely bypass password paste blocking
It would be nice to improve the user experience of the tool and not to confine the user to 5 seconds (or any other timeout) to type the password in the correct place. One way to do so is to figure out, if some keyboard shortcuts could be registered for the tool, which can trigger the typing of the provided password. This way the user may have the familiar experience of Ctrl/Cmd+C/Ctrl/Cmd+V, but Ctrl/Cmd+V may be replaced by some other key combo and will type the password instead of pasting it. If you have any ideas on how to implement this, pull requests are welcome.
Whaler
-
Any Way To See The Dockerfile Used To Make An Image On Dockerhub?
Whaler may help you: https://github.com/P3GLEG/Whaler
-
Reverse Image
https://github.com/P3GLEG/Whaler <-- that should do what you're looking for. It depends on the image having been generated using a standard Dockerfile approach, but that should work for most images.
-
Scanning Millions Of Publicly Exposed Docker Containers - Thousands Of Secrets Leaked
3) Specific tooling. Tools like whaler will automate the process of pulling the Dockerfile contents out of an image file.
-
Reverse Engineering a Docker Image
In addition to Dive, there's also Whaler https://github.com/P3GLEG/Whaler which will print out a Dockerfile from the image, based on the metadata in the image.
You can also use Portainer https://www.portainer.io/ which will show the image layer details in the images section.
What are some alternatives?
DontFuckWithPaste - Google Chrome and Firefox extension that prevents the blocking of pasting into input fields
docker-explorer - A tool to help forensicate offline docker acquisitions
DontF-WithPaste - Google Chrome extension that prevents the blocking of pasting into input fields
Portainer - Making Docker and Kubernetes management easy.
grasp - Create strong passwords using words that are easy for you to remember. A password manager that does not require any type of storage
lazydocker - The lazier way to manage everything docker
goSecretBoxPassword - A probably paranoid Golang utility library for securely hashing and encrypting passwords based on the Dropbox method. This implementation uses Blake2b, Scrypt and XSalsa20-Poly1305 (via NaCl SecretBox) to create secure password hashes that are also encrypted using a master passphrase.
dive - A tool for exploring each layer in a docker image
Passhash - Go library providing simple and secure password management
Docker Compose - Define and run multi-container applications with Docker
argon2pw - Argon2 password hashing package for go with constant time hash comparison
weakpass - Weakpass collection of tools for bruteforce and hashcracking