Be5haram / CICADA2K16
☆18Updated 9 years ago
Alternatives and similar repositories for CICADA2K16
Users that are interested in CICADA2K16 are comparing it to the libraries listed below
Sorting:
- cicada-2014☆48Updated 2 years ago
- Liber Primus Translator☆17Updated 6 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- Twitter as an extra entropy source☆102Updated 6 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Bruteforces [.onion] domains☆80Updated 9 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Git Repo of CoWPAtty☆26Updated 10 years ago
- 🔪 System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.☆71Updated 2 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆168Updated 7 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Spider for searching Onions for other Onions☆10Updated 9 years ago
- Tor traffic whitelisting gateway☆71Updated 2 weeks ago
- TOR Mail encrypted server for Hidden Services☆40Updated 8 years ago
- ☆96Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 7 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆92Updated 9 years ago
- Cicada 3301 2016☆8Updated 9 years ago
- Harvests ZeroNet peers IP addresses☆13Updated 3 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- The future of the decentralized internet begins with the community [L0]☆10Updated 7 years ago