TheTarquin / samesameLinks
Command line tool to generate crafty homograph strings.
☆36Updated 4 years ago
Alternatives and similar repositories for samesame
Users that are interested in samesame are comparing it to the libraries listed below
Sorting:
- A simple, but damn fast sinkhole☆65Updated 10 months ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- Fish in a Barrel Memory Safety Bounty☆47Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- A specialized database server for linear algebra and machine learning.☆86Updated 2 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- Passivley track hosts in local network☆52Updated 2 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 4 years ago
- A warrant canary system☆30Updated 7 years ago
- TLS - what can go wrong?☆108Updated 6 years ago
- Internet data processing tools☆54Updated 4 years ago
- Flashpaper is a simple go-based service for creating one time use links to text data or individual files.☆152Updated last year
- a grep -r for secrets☆178Updated 3 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆108Updated 6 years ago
- ☆25Updated 8 years ago
- ☆33Updated 2 years ago
- Blazingly fast Linux syscall collector☆74Updated 7 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 7 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 10 years ago
- ☆93Updated 3 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago