leonjza / qrxferLinks
Transfer files from Air gapped machines using QR codes
☆112Updated 4 years ago
Alternatives and similar repositories for qrxfer
Users that are interested in qrxfer are comparing it to the libraries listed below
Sorting:
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Python bindings for hashcat☆63Updated 6 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Rogue AP killer☆90Updated 7 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- ☆12Updated 8 years ago
- File transfer via DNS☆73Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- Password analysis software☆37Updated 10 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- ☆56Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Truehunter☆31Updated 4 years ago
- A starttls-capable transparent man-in-the-middle proxy☆52Updated 11 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago