forresttindall / QuantumKeepLinks
A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.
☆13Updated 7 months ago
Alternatives and similar repositories for QuantumKeep
Users that are interested in QuantumKeep are comparing it to the libraries listed below
Sorting:
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- Rubber Ducky powered by NeoKey☆28Updated last year
- A curated list of OSINT MCP servers. Pull requests are welcomed!☆80Updated 10 months ago
- An AI-powered application that conducts structured interviews to create and maintain detailed personal profiles across various life aspec…☆55Updated 10 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- ☆41Updated 10 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Updated 3 years ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Updated last year
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆18Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆112Updated 3 weeks ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆19Updated 4 years ago
- Get a number of your tweets from the Twitter API.☆13Updated 3 years ago
- Visualize BBOT scans in realtime with VivaGraphJS☆60Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- A Vue App for quickly generating KML Search Grids☆13Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Updated 4 months ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Updated 8 years ago
- A host-based IDS and network monitoring system (My graduation project)☆23Updated 4 years ago
- Legba recipes.☆51Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated 2 months ago
- ☆12Updated 2 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Updated 2 months ago
- MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.☆43Updated 11 months ago
- SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP☆15Updated 6 years ago
- Social Links API: description, examples, trial access☆119Updated 9 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 5 months ago
- Force target victim to unsafe network☆30Updated 8 months ago
- Search information across a youtube Channel☆15Updated last year
- ☆14Updated last year