cyph / ransompkpLinks
"RansomPKP" proof of concept.
☆11Updated 9 years ago
Alternatives and similar repositories for ransompkp
Users that are interested in ransompkp are comparing it to the libraries listed below
Sorting:
- iSEC Partners' research publications☆76Updated 9 years ago
- ☆38Updated 8 years ago
- ☆24Updated 10 years ago
- ☆56Updated 8 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- ☆30Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆25Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 6 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆199Updated 9 years ago
- Threatbutt Suite☆37Updated 10 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- Recon system hardening scanner☆46Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- ☆27Updated 7 years ago
- free crypto audit☆31Updated 8 years ago
- BitErrant☆59Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago