RobinLinus / inspector-open-detectionLinks
Simple demo of Samy Kamkar's "inspector is open" detection
☆23Updated 8 years ago
Alternatives and similar repositories for inspector-open-detection
Users that are interested in inspector-open-detection are comparing it to the libraries listed below
Sorting:
- Personal, Reactive, Open, Private, Secure. Own and control YOUR data.☆19Updated 10 years ago
- client-side AES-encrypted Markdown pastebin clone☆51Updated 7 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Check domain availability on all TLDs☆61Updated 7 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Updated 14 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 9 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Updated 3 years ago
- A simple REST API to identify requests made from TOR network.☆27Updated 4 years ago
- A public chatting room for everyone.☆24Updated 2 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Funnel is a lightweight yara-based feed scraper☆39Updated 2 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Client side encrypted file upload with HTML5☆26Updated 14 years ago
- 🕶 Remove GPS data from your photos before you upload them.☆14Updated 7 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 8 years ago
- Create wifi access points on the go (karma-like), simulate internet connectivity, gather whatever is sent ;)☆11Updated 3 months ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11Updated 10 years ago
- Power line communication through processor load modulation☆12Updated 8 years ago
- Some files relating to timelapse photography on a raspberry pi zero☆12Updated 8 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- WiFi Data Safari Workshop☆78Updated 7 years ago
- Web-app to identify the different types of hashes☆21Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Explore the Tor network☆89Updated 2 years ago
- Single-threaded epoll-based concurrent bulk whois client☆32Updated 8 years ago