Be5haram / CICADA2K16Links
☆18Updated 9 years ago
Alternatives and similar repositories for CICADA2K16
Users that are interested in CICADA2K16 are comparing it to the libraries listed below
Sorting:
- cicada-2014☆49Updated 2 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Twitter as an extra entropy source☆103Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆92Updated 9 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Outputs a reduced keyspace of random or sequential hex digits.☆43Updated 8 years ago
- A Teensy script to open up a reverse TCP shell on Windows machines in as little time as possible.☆104Updated 8 years ago
- Stargate☆94Updated 8 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆168Updated 7 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Live-scraping pastebin to fight boredom.☆111Updated 2 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- Bash script to install Honeypot projects ona Raspbian System☆28Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Anti-Anti-Automation Framework☆97Updated 10 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- ☆25Updated 7 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Liber Primus Translator☆17Updated 6 years ago
- LIFARS Networking Security GNU/Linux distro☆27Updated 6 years ago