micheloosterhof / cicada-2014View external linksLinks
cicada-2014
☆49Jul 23, 2022Updated 3 years ago
Alternatives and similar repositories for cicada-2014
Users that are interested in cicada-2014 are comparing it to the libraries listed below
Sorting:
- Liber Primus Translator☆18Jul 5, 2018Updated 7 years ago
- Firmware images for hacking, reverse engineering, and teardown of the Ryze / DJI / Intel Movidius Tello☆10Dec 6, 2018Updated 7 years ago
- Cryptographic Time-delay Engine☆10Mar 24, 2014Updated 11 years ago
- PGP web-app that verifies signed ascii armor messages automatically.☆11Jul 6, 2023Updated 2 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- Tiny Honeypot☆19Aug 9, 2013Updated 12 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Mar 8, 2016Updated 9 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- NIST CSRC Cryptography Toolkit test vectors (unofficial and dumped to text)☆24Oct 6, 2018Updated 7 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- 🤖 Daily updated translation maps for T-Pot☆22Apr 25, 2024Updated last year
- An initscript to start Minecraft or CraftBukkit on CentOS, Fedora, and Ubuntu☆65Nov 14, 2014Updated 11 years ago
- ☆28Dec 7, 2016Updated 9 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- ☆27Dec 20, 2018Updated 7 years ago
- A honeypot for malware that propagates via USB storage devices☆102Mar 24, 2015Updated 10 years ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Oct 29, 2019Updated 6 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Original files from the puzzles, wiki pages, media coverage, old logs and more.☆30Apr 30, 2022Updated 3 years ago
- Tool to help identify timing attacks☆70Sep 4, 2011Updated 14 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆38Dec 17, 2014Updated 11 years ago
- FE-511 Bloomberg Terminal and Thomson Reuters☆11Feb 8, 2017Updated 9 years ago
- Emoji for the BA shell – use emoji as Environment Variables☆25Feb 29, 2016Updated 9 years ago
- CLP Principles by the Liquid Legal Institute☆11Apr 12, 2021Updated 4 years ago
- ☆38Jan 23, 2026Updated 3 weeks ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Python script to detect and remove suspicious likes from Instagram☆10Oct 21, 2020Updated 5 years ago
- Gedcom file Viewer☆13Feb 15, 2016Updated 10 years ago
- Facebook simulator web browser☆10Apr 23, 2021Updated 4 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- a python-based netstat equivalent☆34Jan 12, 2018Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Nov 24, 2024Updated last year
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- Do various administration tasks in your AWS account using your Amazon Echo.☆34Mar 21, 2016Updated 9 years ago
- This is the LaTeX source code a CC book called "Edible food". It contains fruits, vegetables, cereals, etc. with pictures and their names…☆12Feb 17, 2022Updated 3 years ago
- ☆10Mar 13, 2020Updated 5 years ago
- 📢 Feedback from docs.microsoft.com team blog☆11Sep 5, 2021Updated 4 years ago