mathiasbynens / bacon-cipherLinks
A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.
☆24Updated 10 years ago
Alternatives and similar repositories for bacon-cipher
Users that are interested in bacon-cipher are comparing it to the libraries listed below
Sorting:
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Detect whether a site is running behind Cloudflare.☆24Updated last year
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Security scanner to find temporary config files that contain passwords on public websites☆74Updated 13 years ago
- Obfuscate JavaScript (beyond repair) with Ruby☆88Updated 5 months ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Miscellaneous☆20Updated 7 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆19Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- A regular expression for most valid domains (including the latest TLDs)☆40Updated 10 years ago
- JavaScript parser and sandbox☆78Updated 8 years ago
- Hide secret information in typographical errors☆32Updated 9 years ago
- A curated list of free public proxy servers☆72Updated 6 years ago
- XSS exploitation tool - access victims through HTTP proxy☆159Updated 11 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- My blog where I make a new coding project every Thursday.☆45Updated 2 years ago
- Script for doing evil stuff to Redis servers (for educational purposes only).☆70Updated 9 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆44Updated 9 years ago
- Multithreaded SQL union bruteforcer☆16Updated 13 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆124Updated 7 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- Parse HTTP Security Headers☆39Updated 11 months ago
- a javascript keylogger included in a gif file☆39Updated 3 weeks ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- log file scrubber☆16Updated 7 years ago