casprlab / pixieLinks
Camera Based Two Factor Authentication Through Mobile and Wearable Devices
☆37Updated 8 years ago
Alternatives and similar repositories for pixie
Users that are interested in pixie are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner based on vulners.com audit API☆199Updated 7 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆96Updated 7 years ago
- simple git encryption☆51Updated 4 years ago
- Google Chrome extension implementing JavaScript Zero☆149Updated 7 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- Bruteforces [.onion] domains☆80Updated 9 years ago
- ☆15Updated 8 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- DNS tunnel☆61Updated 12 years ago
- Public release of the RetroScope Android memory forensics framework☆118Updated 5 years ago
- CERT Tapioca for MITM network analysis☆184Updated last year
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- Fast TCP encryption☆212Updated 3 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- no longer maintained, check the forks for maintained versions☆93Updated 10 years ago
- An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers☆59Updated 7 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- ☆56Updated 8 years ago
- Store 802.11 frames in Elasticsearch. Visualize with Kibana☆58Updated last year
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- An Ember.js web client for Vuvuzela messaging system☆60Updated 7 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- Lightweight and sexy Security Information and Event Managment system for OSSEC, Snort and other IDS/IPS☆110Updated 4 years ago
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆201Updated last year
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- A set of scripts to root and install gapps and orbot+orwall into a CopperheadOS image and re-sign it for verified boot.☆223Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago