Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Abad, and Gabriel Acevedo of Cylance.
☆11Jul 9, 2014Updated 11 years ago
Alternatives and similar repositories for prangster
Users that are interested in prangster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- A proxy for encrypting TCP connections.☆11Mar 15, 2017Updated 9 years ago
- Abusing U2F to 'store' a stable secret☆15Nov 23, 2015Updated 10 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Seed recovery tool for PRNGs☆41Nov 13, 2016Updated 9 years ago
- Check read, write permissions on S3 buckets in your account☆20Jun 20, 2019Updated 6 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Location service☆23Feb 13, 2026Updated last month
- Shor's algorithm simulation using CUDA☆19Nov 10, 2019Updated 6 years ago
- Utilizing deep learning techniques to predict Bitcoin price movements based on historical data and relevant market indicators.☆11Jun 22, 2024Updated last year
- ☆13Feb 22, 2026Updated last month
- ☆13May 30, 2017Updated 8 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- Sample to Bitcoin Address Validation☆10Nov 24, 2018Updated 7 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Aug 6, 2014Updated 11 years ago
- ECDSA P-256 signature verification in a single C file targetting embedded use☆13Apr 1, 2023Updated 2 years ago
- Array quantization and compression☆14Dec 8, 2023Updated 2 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Maven Infrastructure using Docker☆16Updated this week
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- ☆11Apr 17, 2021Updated 4 years ago
- 🔐💻 ecloop: A high-performance, CPU-optimized tool for computing public keys on the secp256k1 elliptic curve, with features for searchin…☆14Jul 20, 2024Updated last year
- eXo Platform Community edition in a Docker container (use eXo Tribe website forum to ask questions or report problems)☆20Feb 12, 2026Updated last month
- Your best is still an idiot.☆10Sep 24, 2021Updated 4 years ago
- Distributed Shell: A way to replicate system administration commands across machines using Raft☆10Apr 23, 2015Updated 10 years ago
- [AUR][Pacman] Current Cuda compatibility with Tensorflow and Torch on Arch Linux☆18Dec 10, 2024Updated last year
- ☆32May 9, 2021Updated 4 years ago
- Bruteforce to calculate private key over public key.☆14Nov 16, 2022Updated 3 years ago
- FFT Explorations (basic implementation)☆10Aug 8, 2014Updated 11 years ago
- Passivedns monitor implementation in Rust.☆12Apr 21, 2016Updated 9 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- Delay a systemd service's startup until network interfaces are online☆18Mar 15, 2026Updated last week
- Generates a single, PGP signed web page from multiple source files.☆11Aug 24, 2016Updated 9 years ago
- Error-free transformations are used to get results with extra accuracy.☆15Jan 20, 2025Updated last year
- A library for managing undo and redo commands☆16Nov 7, 2024Updated last year