kpcyrd / tr1pdLinks
tamper resistant audit log
☆18Updated 6 years ago
Alternatives and similar repositories for tr1pd
Users that are interested in tr1pd are comparing it to the libraries listed below
Sorting:
- (Oblivious) DoH Server☆26Updated 3 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- PANORAMIX repo☆20Updated 2 years ago
- Pong revolution.☆13Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- the puppy proxy☆22Updated 5 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆31Updated 6 years ago
- An attack/exploit Detector that utilizes Polymorphism and Diversity☆29Updated 3 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- OSINT - SOCMINT (social media intelligence) Twitter hashtag analyzer☆19Updated 6 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Small container runtime for threat detection☆14Updated 2 months ago
- Print core memory of a given a process ID (linux specific)☆11Updated 7 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated 2 months ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- ☆18Updated 2 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.