cmars / prangster
Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Abad, and Gabriel Acevedo of Cylance.
☆11Updated 10 years ago
Alternatives and similar repositories for prangster:
Users that are interested in prangster are comparing it to the libraries listed below
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆15Updated 8 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- recon framework in ruby☆13Updated 13 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆11Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆10Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- ☆13Updated 7 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 8 years ago
- ☆24Updated 3 years ago
- ☆26Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Virtual host brute forcer☆22Updated 11 years ago