mathiasbynens / bacon-cipherLinks
A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.
☆24Updated 10 years ago
Alternatives and similar repositories for bacon-cipher
Users that are interested in bacon-cipher are comparing it to the libraries listed below
Sorting:
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- A backdoor embedded with Twitter Player Card☆12Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- ESPot - ElasticSearch Honeypot☆28Updated 11 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆394Updated 11 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Updated 5 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 10 years ago
- a javascript keylogger included in a gif file☆39Updated 6 months ago
- XMLRPC server for password cracking☆33Updated 11 years ago
- A regular expression for most valid domains (including the latest TLDs)☆40Updated 11 years ago
- OpenSSH remote DOS exploit and vulnerable container☆53Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Demo of phishing attack on the native HTML5 full screen API.☆118Updated 12 years ago
- ☆73Updated 12 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- Some useful scripts for penetration testing☆46Updated 8 years ago
- Script for doing evil stuff to Redis servers (for educational purposes only).☆71Updated 9 years ago
- JavaScript parser and sandbox☆79Updated 9 years ago
- Obfuscate JavaScript (beyond repair) with Ruby☆89Updated 10 months ago
- Miscellaneous☆20Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- A curated list of free public proxy servers☆72Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago