Taiiwo / cicada
A python library for working with the Liber Primus
☆17Updated 8 months ago
Alternatives and similar repositories for cicada:
Users that are interested in cicada are comparing it to the libraries listed below
- Within the deep web, there exists a page that hashes to: 36367763ab73783c7af284446c59466b4cd653239a311cb7116d4618dee09a8425893dc7500b464f…☆13Updated 4 years ago
- ☆112Updated last year
- 3301 - Unmodified files, transcription and other assets.☆183Updated last year
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆180Updated last year
- Reverse Shell with Python 3☆27Updated 4 years ago
- Onionbalance -- mirror of https://gitlab.torproject.org/tpo/onion-services/onionbalance/ -- please create issues and pull requests there☆155Updated this week
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆245Updated 7 months ago
- Vanguards help guard you from getting vanned...☆228Updated 9 months ago
- (AKA Marutukku) Backup of Assange's deniable cryptosystem.☆67Updated 13 years ago
- Encryption, digital money, anonymous networks, digital pseudonyms, zero knowledge, reputations, information markets, black markets, colla…☆97Updated last year
- Simple python malware for back connect in windows☆58Updated 7 years ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆83Updated 5 years ago
- A tiny Tor client implementation (in pure python).☆133Updated last year
- Implementation of onion routing in Python☆25Updated 7 years ago
- I2P-Bote is a serverless, encrypted e-mail application.☆152Updated 3 years ago
- Fork of OpenSSH that includes prototype quantum-resistant key exchange and authentication in SSH based on liboqs. PROJECT INACTIVE. CONTR…☆194Updated last week
- 🌠 The World's Fastest StegCracker 🌠☆28Updated 4 years ago
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆71Updated 8 years ago
- Command-line monitor for Tor.☆128Updated 9 months ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆277Updated last year
- Standalone Monero payment processor for incoming and outgoing transactions.☆131Updated 4 months ago
- Rust crate that builds a static version of Tor☆36Updated 2 years ago
- EndGame DDoS filter.☆240Updated 3 years ago
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆18Updated 4 months ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆611Updated 6 months ago
- An IRC bot written in Python.☆74Updated 2 weeks ago
- Quantum resistant implementation of the WireGuard protocol.☆39Updated 7 months ago
- Securely build a system Tor and optionally configure numerous high-security Onion services.☆50Updated 2 years ago
- A CPU-friendly client puzzle with instant verification☆113Updated 4 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago