diracdeltas / aliaser
☆32Updated 4 years ago
Alternatives and similar repositories for aliaser
Users that are interested in aliaser are comparing it to the libraries listed below
Sorting:
- ☆25Updated 7 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- Guidelines, principles published on https://infosec.mozilla.org☆98Updated 2 months ago
- Binary exploitation CTF challenge☆24Updated 6 years ago
- Linux file read monitor☆89Updated last year
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- CableTap public disclosure documents.☆78Updated 7 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆92Updated last year
- Command line tool to generate crafty homograph strings.☆35Updated 3 years ago
- Automated OpenSSH hardening☆43Updated 8 years ago
- Source to www.draw.io☆99Updated 5 years ago
- JSON API's Are Automatically Protected Against CSRF, And Google Almost Took It Away.☆34Updated 7 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- A DNS connectback shell executed by strings in payloads.txt☆105Updated last year
- This code was used with Arduino Nano to create the OG defcon 26 badge emulator.☆56Updated 5 years ago
- Wordpress automation and hardening☆49Updated 5 years ago
- service to check internet accessibility☆42Updated last year
- free crypto audit☆31Updated 8 years ago
- Scan localhost for various popular services.☆70Updated 4 years ago
- ☆45Updated 3 years ago
- Mike Lindell's cybersymposium files☆48Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- 🐦 Find tweets that contain expired or claimable URLs from your Twitter archive.☆43Updated 6 years ago
- "RansomPKP" proof of concept.☆11Updated 8 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 7 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Slides from presentations I give!☆25Updated 3 weeks ago
- Record video live to a server you control, just for fun or in case you need to collect evidence and don't want it just on your device or …☆42Updated 4 years ago