david415 / HoneyBadgerLinks
Quantum Insert detector/recorder
☆307Updated 6 years ago
Alternatives and similar repositories for HoneyBadger
Users that are interested in HoneyBadger are comparing it to the libraries listed below
Sorting:
- OZ: a sandboxing system targeting everyday workstation applications☆440Updated 7 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Pond☆917Updated 4 years ago
- A tool to fingerprint SSL/TLS servers☆265Updated 4 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Haka runtime☆449Updated 8 years ago
- Deprecated - MIG Memory Forensic library☆384Updated 4 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated last month
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆242Updated 3 months ago
- Subgraph Application Firewall☆105Updated 7 years ago
- TextSecure client package for Go☆128Updated 6 years ago
- An XMPP client with OTR support☆362Updated 4 years ago
- ☆66Updated 10 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- Self contained cross platform DNS recon tool☆187Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 9 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆141Updated 8 years ago
- A fast implementation of the Tor OR code, in Go☆103Updated 9 years ago
- Quantum Insert☆214Updated 7 years ago
- Jump to Full Encryption☆61Updated 9 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 9 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 11 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated 2 years ago
- Go seccomp parser and compiler☆53Updated 8 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 4 years ago