casprlab / pixieLinks
Camera Based Two Factor Authentication Through Mobile and Wearable Devices
☆37Updated 8 years ago
Alternatives and similar repositories for pixie
Users that are interested in pixie are comparing it to the libraries listed below
Sorting:
- Public release of the RetroScope Android memory forensics framework☆118Updated 5 years ago
- Vulnerability scanner based on vulners.com audit API☆199Updated 7 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- DNS tunnel☆62Updated 12 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- An Ember.js web client for Vuvuzela messaging system☆60Updated 7 years ago
- Linux antimalware and antirootkit tool☆108Updated 3 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- simple git encryption☆51Updated 3 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- HTTPS Server without a public/static IP. TLS Tunnels with decentralized credentials.☆87Updated 4 years ago
- THIS PROJECT IS DEPRECATED☆63Updated 9 years ago
- Passive SSL client fingerprinting using handshake analysis.☆112Updated 7 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- Noddos client☆74Updated 5 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆96Updated 7 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago
- ☆56Updated 8 years ago
- Store 802.11 frames in Elasticsearch. Visualize with Kibana☆58Updated last year
- Fast TCP encryption☆212Updated 3 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers☆59Updated 7 years ago
- System administration tools☆59Updated 3 months ago
- ☆15Updated 8 years ago
- ☆153Updated 7 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago