micheloosterhof / cicada-2014Links
cicada-2014
☆50Updated 3 years ago
Alternatives and similar repositories for cicada-2014
Users that are interested in cicada-2014 are comparing it to the libraries listed below
Sorting:
- Twitter as an extra entropy source☆104Updated 7 years ago
- 3301 - Unmodified files, transcription and other assets.☆187Updated 2 years ago
- ☆18Updated 9 years ago
- Panic button for protection against cold boot attacks☆146Updated 3 years ago
- Liber Primus Translator☆18Updated 7 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆146Updated 2 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- A collection of Hack The Planet's zines.☆72Updated 9 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 8 years ago
- simhacks website☆85Updated 5 years ago
- An open source encryption program that uses the "one-time pad" method.☆33Updated 5 years ago
- A collection of crackmes☆40Updated 11 months ago
- Proof of Concept for Ledger Nano S MCU exploit☆167Updated 7 years ago
- A C/CPP MSR605 Library for interacting with the the MSR60X (and other MSR206 compatible) Magstripe Reader/Writers☆63Updated 10 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- An investigation into Jacob Appelbaum leaving the Tor Project☆99Updated last month
- ☆25Updated 8 years ago
- Kraken A5/1 Cracking Project Fork☆63Updated 11 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 9 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆67Updated 4 years ago
- access tor hidden services thru the Web☆71Updated 13 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆51Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- ☆81Updated 8 years ago
- 🔪 System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.☆72Updated 3 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago