deveyNull / phistOfFuryLinks
Perceptual Hashing Image Similarity Framework
☆31Updated 6 years ago
Alternatives and similar repositories for phistOfFury
Users that are interested in phistOfFury are comparing it to the libraries listed below
Sorting:
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- ☆24Updated 10 years ago
- Transfer files from Air gapped machines using QR codes☆112Updated 4 years ago
- Content for Stroom such as XML Schemas, translations, pipelines and dashboards☆10Updated 2 weeks ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆17Updated last year
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Sequence Indexing and Search☆109Updated 3 months ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 11 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated 6 months ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Swiss army knife for (web) security specialists.☆12Updated 7 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- ☆24Updated 3 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- tamper resistant audit log☆18Updated 7 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆112Updated last year
- ☆56Updated 8 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago