hshackers / docsLinks
Documentation for HS Hackers
☆31Updated 9 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- Give the NSA free backdoor access to your Flask app.☆187Updated 12 years ago
- Repeat yourself with some intelligence. This, if used correctly, can improve your productivity by 2x - 5x.☆14Updated 9 years ago
- A multi-platform chat bot☆42Updated 5 years ago
- A server for sending push notifications to mobile apps☆30Updated 7 years ago
- Hackable collaboration.☆38Updated 11 years ago
- A series of exploits used to jump the OnePlus reservation queue.☆124Updated 8 years ago
- Deprecated - OLD - See Below☆45Updated 7 years ago
- Automatically sets the daily xkcd comic as your wallpaper.☆15Updated 8 years ago
- Disclaimer: These are actions and applications I believe to be the best for setting up an optimal development environment are extensions …☆21Updated 10 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 9 years ago
- HTTP framework☆48Updated 8 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆926Updated 10 years ago
- Script for spoofing network adapter's MAC address on Windows.☆185Updated 10 years ago
- The Blind Public License is a restrictive license that does not allow any person to read, view, interpret, emulate, debug, disassemble, r…☆55Updated 9 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆63Updated 9 years ago
- ☆56Updated 10 years ago
- Make PGP messages and signatures more interesting☆496Updated 2 years ago
- ☆20Updated 9 years ago
- Branding assets for the Hackathon Hackers and its subgroups☆11Updated 10 years ago
- Hohha Dynamic XOR Encryption Algorithm☆55Updated 6 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆107Updated 9 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆311Updated 4 years ago
- The ultimate book of tutorials from hackathon projects (Suggested by @jonmarkgo)☆24Updated 11 years ago
- Evil Genius plays the role of the Descartes demon, creating a distorted view of the internet with censorship (it's a censorship simulator…☆38Updated 11 years ago
- Monitor for any changes in your C/C++ files and automatically compiles and runs the program☆13Updated 10 years ago
- Cryptographically bulletproof encryption algorithm based on the cutting edge MD5 hashing algorithm☆24Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago