antoinet / valora
WiFi Tracker Confuser
☆65Updated 7 years ago
Alternatives and similar repositories for valora:
Users that are interested in valora are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- ☆56Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆65Updated 7 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- A program to send Ethernet PAUSE frames☆36Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- IP Over QR Code Tunnel☆199Updated 8 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- ☆38Updated 7 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆25Updated 7 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- A Linux shell script to improve your privacy online☆83Updated 9 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 2 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- List of Free Software and IT Security related conferences☆52Updated last year