deveyNull / phistOfFuryLinks
Perceptual Hashing Image Similarity Framework
☆31Updated 6 years ago
Alternatives and similar repositories for phistOfFury
Users that are interested in phistOfFury are comparing it to the libraries listed below
Sorting:
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- Quantum Insert/FoxAcid case study☆15Updated 8 years ago
- ☆24Updated 10 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆110Updated 11 months ago
- ☆38Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 8 years ago
- HTTP-traceroute in Go☆18Updated 9 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Updated 12 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Web on top of any protocol☆113Updated 5 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Swiss army knife for (web) security specialists.☆12Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Suite for Information gathering☆12Updated 7 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 2 months ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated 4 months ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago