dreadiscool / LastProxy
☆9Updated 9 years ago
Alternatives and similar repositories for LastProxy:
Users that are interested in LastProxy are comparing it to the libraries listed below
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Clash Royale protocol dissector for Wireshark☆15Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- simple scripts to parse and patch Microsoft fitness band firmware update file☆12Updated last year
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- python-deepviz is a python wrapper for deepviz.com REST APIs☆11Updated 7 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Truehunter☆31Updated 3 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 2 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 6 years ago
- Network white noise collector☆18Updated 9 years ago
- Docker configs and build scripts.☆22Updated 10 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Host files with DNS☆32Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- ☆10Updated 9 years ago
- My blog where I make a new coding project every Thursday.☆44Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- ld_preload userland rootkit☆34Updated 4 years ago