mathiasbynens / bacon-cipherLinks
A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.
☆24Updated 10 years ago
Alternatives and similar repositories for bacon-cipher
Users that are interested in bacon-cipher are comparing it to the libraries listed below
Sorting:
- A regular expression for most valid domains (including the latest TLDs)☆40Updated 10 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Obfuscate JavaScript (beyond repair) with Ruby☆88Updated 7 months ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- Script for doing evil stuff to Redis servers (for educational purposes only).☆71Updated 9 years ago
- JavaScript parser and sandbox☆79Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- a javascript keylogger included in a gif file☆39Updated 2 months ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆394Updated 10 years ago
- Miscellaneous☆20Updated 7 years ago
- A silly & effective MD5 cracker in Python☆254Updated 4 months ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 6 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- ESPot - ElasticSearch Honeypot☆27Updated 11 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Updated 7 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 10 years ago
- Information Security News☆61Updated last year
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Updated 11 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆26Updated 9 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆110Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 7 years ago
- A curated list of free public proxy servers☆72Updated 6 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Updated 8 years ago
- Explore the Tor network☆88Updated 2 years ago