cmars / prangster
Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Abad, and Gabriel Acevedo of Cylance.
☆11Updated 10 years ago
Alternatives and similar repositories for prangster:
Users that are interested in prangster are comparing it to the libraries listed below
- like hidden-tear with libsodium☆20Updated 9 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Phishing Toolkit☆19Updated 6 years ago
- ☆15Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- ☆12Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Yara Plugin for Binary Ninja☆13Updated 6 years ago
- ☆27Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- recon framework in ruby☆13Updated 13 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago