kwestin / applerazorLinks
initial upload
☆19Updated 10 years ago
Alternatives and similar repositories for applerazor
Users that are interested in applerazor are comparing it to the libraries listed below
Sorting:
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 8 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆101Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- ☆40Updated 9 years ago
- Anti-Anti-Automation Framework☆100Updated 11 years ago
- A OS X crypto ransomware PoC☆89Updated 10 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆926Updated 10 years ago
- Stargate☆96Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 14 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- ☆198Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Updated 3 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 3 weeks ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Rogue AP killer☆91Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Transparent network tap☆122Updated 10 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago