casprlab / pixieLinks
Camera Based Two Factor Authentication Through Mobile and Wearable Devices
☆37Updated 8 years ago
Alternatives and similar repositories for pixie
Users that are interested in pixie are comparing it to the libraries listed below
Sorting:
- Public release of the RetroScope Android memory forensics framework☆119Updated 5 years ago
- CERT Tapioca for MITM network analysis☆185Updated last year
- An Ember.js web client for Vuvuzela messaging system☆60Updated 7 years ago
- no longer maintained, check the forks for maintained versions☆93Updated 10 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆166Updated 8 years ago
- Store 802.11 frames in Elasticsearch. Visualize with Kibana☆59Updated last year
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Vulnerability scanner based on vulners.com audit API☆199Updated 7 years ago
- DNS tunnel☆62Updated 12 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- Fast TCP encryption☆214Updated 3 years ago
- ☆56Updated 8 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆95Updated 8 years ago
- This server serves the files at airborn.io, manages users, and keeps track of users file sizes.☆60Updated last year
- HTTPS Server without a public/static IP. TLS Tunnels with decentralized credentials.☆87Updated 5 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- Google Chrome extension implementing JavaScript Zero☆151Updated 8 years ago
- Anonymous web chat server, built on top of Themis/WebThemis☆107Updated 9 years ago
- Subgraph OS Handbook☆123Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆66Updated 7 years ago
- Linux antimalware and antirootkit tool☆107Updated 4 years ago
- THIS PROJECT IS DEPRECATED☆64Updated 9 years ago
- TOR Mail encrypted server for Hidden Services☆44Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆201Updated 2 years ago
- Specification of the Noise Socket protocol☆59Updated 7 years ago
- Bruteforce attack blocker (ssh, FTP, SMTP, and more)☆64Updated 4 years ago