Be5haram / CICADA2K16
☆18Updated 8 years ago
Alternatives and similar repositories for CICADA2K16:
Users that are interested in CICADA2K16 are comparing it to the libraries listed below
- cicada-2014☆47Updated 2 years ago
- Twitter as an extra entropy source☆99Updated 6 years ago
- Panic button for protection against cold boot attacks☆140Updated 2 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆92Updated 8 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- ☆24Updated 2 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆145Updated last year
- Minimal Bitcoin address generator in Python☆108Updated 3 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Bruteforces [.onion] domains☆80Updated 9 years ago
- Docker container for running an IRC server as a Tor hidden service☆50Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆167Updated 6 years ago
- Detect snooper on your system!☆83Updated 7 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆37Updated 7 years ago
- A collection of crackmes☆40Updated 6 years ago
- Hardware for the Breaking Bitcoin Board☆12Updated 7 years ago
- ☆83Updated 7 years ago
- LIFARS Networking Security GNU/Linux distro☆26Updated 6 years ago
- Bitcoin P2P Network Sniffer☆72Updated 12 years ago
- HTTPS Everywhere rulesets for hidden services and eepsites.☆168Updated 7 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Git Repo of CoWPAtty☆24Updated 9 years ago
- Black Nurse DOS attack☆71Updated 7 years ago