deveyNull / phistOfFuryLinks
Perceptual Hashing Image Similarity Framework
☆29Updated 6 years ago
Alternatives and similar repositories for phistOfFury
Users that are interested in phistOfFury are comparing it to the libraries listed below
Sorting:
- ☆25Updated 10 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- IRIS Worm is a real-time data graphing component.☆12Updated 5 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- ☆24Updated 4 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Updated last year
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 9 months ago
- Osmocom SS7 stack, with Shadytel modifications.☆19Updated 13 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆80Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆16Updated last year
- HTTP-traceroute in Go☆19Updated 10 years ago
- drivesploit-testing☆26Updated 15 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 9 years ago
- Transfer files from Air gapped machines using QR codes☆113Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆114Updated last year