EinBaum / spaghetti
code killer utility - replaces all letters with unicode symbols that look the same
☆26Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for spaghetti
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- CVE-2016-5195 exploit written in Crystal☆12Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 9 years ago
- Alternative hexdump.☆15Updated 8 years ago
- Portable, light-weight ircd written in Go.☆53Updated 7 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- A wrapper for dd☆19Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆57Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- ☆9Updated 7 years ago
- ld_preload userland rootkit☆33Updated 3 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 7 years ago
- Create command line applications with a config file.☆16Updated 7 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆34Updated 10 years ago
- Detect passive activity in the Tor-network☆13Updated 9 years ago
- Passive Bitcoin Project☆10Updated 9 years ago
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago
- Connect to 2-factor WatchGuard VPNs on Linux with OpenVPN☆15Updated 7 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- A small bash minifier/obfuscator written in Perl.☆54Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- A script to create, mount and umount LUKS encrypted disk image files.☆16Updated 4 months ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- More Obvious Webmalware Repository☆15Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago