micheloosterhof / cicada-2014
cicada-2014
☆48Updated 2 years ago
Alternatives and similar repositories for cicada-2014
Users that are interested in cicada-2014 are comparing it to the libraries listed below
Sorting:
- ☆18Updated 9 years ago
- Twitter as an extra entropy source☆102Updated 6 years ago
- Liber Primus Translator☆17Updated 6 years ago
- (AKA Marutukku) Backup of Assange's deniable cryptosystem.☆67Updated 13 years ago
- Cicada 3301 2016☆8Updated 9 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- A collection of crackmes☆40Updated 3 months ago
- Detect snooper on your system!☆83Updated 8 years ago
- Reticle is a C&C network for small devices that want to be friends.☆89Updated 11 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Proof of Concept for Ledger Nano S MCU exploit☆168Updated 7 years ago
- irc bot with many useful commands☆11Updated 5 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- A super micro fun implant☆23Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- 🔪 System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.☆71Updated 2 years ago
- An open source encryption program that uses the "one-time pad" method.☆33Updated 4 years ago
- LIFARS Networking Security GNU/Linux distro☆27Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A collection of Hack The Planet's zines.☆71Updated 8 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 12 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- ☆29Updated 2 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Demonsaw Source Code☆123Updated 3 years ago