matthewaveryusa / whitekitLinks
whitekit
☆18Updated 9 years ago
Alternatives and similar repositories for whitekit
Users that are interested in whitekit are comparing it to the libraries listed below
Sorting:
- ☆287Updated 9 years ago
- ☆115Updated 9 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- Live at http://extractdata.club☆166Updated 8 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆99Updated 8 years ago
- A public database for software and firmware hashes☆216Updated 8 years ago
- Machine learning algorithm to connect anonymous accounts to real names☆95Updated 9 years ago
- Open Database of Firmware Test Results☆150Updated 9 years ago
- Full network stack over sound -- lwIP driver for libquiet☆664Updated 5 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- HTTP framework☆48Updated 7 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆415Updated 7 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- How to backdoor Diffie-Hellman☆615Updated 9 years ago
- System Architecture Mapper☆174Updated 7 years ago
- Kindle 5.6.5 exploitation tools.☆431Updated 7 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆322Updated 8 years ago
- an embeddable dumb heartbeat daemon in 260 bytes of RAM and ≈350 bytes of code☆271Updated 7 years ago
- A tiny challenge to solve by Machine Learning or Computer Hacking (or both)☆92Updated 8 years ago
- Von Neumann Defense Force☆120Updated 8 years ago
- A Linux shell script to improve your privacy online☆85Updated 9 years ago
- search key to restore petya encrypted mft☆612Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- Hack your friend's online MMORPG game - specific focus, csrf/xss attacks☆91Updated 9 years ago
- Educational SSH client☆124Updated 9 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Koszek-Matyja Network Simulator. Specify network architecture in a simple configuration file and run network simulations.☆59Updated 9 years ago