deveyNull / phistOfFuryLinks
Perceptual Hashing Image Similarity Framework
☆31Updated 6 years ago
Alternatives and similar repositories for phistOfFury
Users that are interested in phistOfFury are comparing it to the libraries listed below
Sorting:
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- ☆24Updated 10 years ago
- Quantum Insert/FoxAcid case study☆15Updated 8 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Updated 8 years ago
- Osmocom SS7 stack, with Shadytel modifications.☆19Updated 13 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated 3 months ago
- Swiss army knife for (web) security specialists.☆12Updated 7 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- ☆38Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- tamper resistant audit log☆18Updated 6 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- A kernel network manager with monitoring and limiting capabilities for macOS. #nsacyber☆107Updated 8 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago