Be5haram / CICADA2K16Links
☆18Updated 10 years ago
Alternatives and similar repositories for CICADA2K16
Users that are interested in CICADA2K16 are comparing it to the libraries listed below
Sorting:
- cicada-2014☆49Updated 3 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆146Updated 2 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆93Updated 9 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- Git Repo of CoWPAtty☆26Updated 10 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆67Updated 4 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆274Updated 5 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- Liber Primus Translator☆18Updated 7 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆168Updated 7 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated 2 years ago
- Bruteforces [.onion] domains☆80Updated 10 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Updated 7 years ago
- ☆95Updated 8 years ago
- PirateBox Scriptcollection for running in Webserver☆205Updated 3 years ago
- Detect snooper on your system!☆85Updated 9 years ago
- Hardware for the Breaking Bitcoin Board☆13Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆147Updated 10 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆245Updated 5 years ago
- 3301 - Unmodified files, transcription and other assets.☆188Updated 2 years ago
- Leak Protection (Fail Safe Mechanism) for (Open)VPN☆175Updated 7 years ago
- Wipe files and drives securely with randoms ASCII dicks☆131Updated 6 years ago
- ☆81Updated 8 years ago
- 🔪 System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.☆73Updated 3 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆361Updated 5 months ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 8 years ago