micheloosterhof / cicada-2016
Cicada 3301 2016
☆8Updated 9 years ago
Alternatives and similar repositories for cicada-2016
Users that are interested in cicada-2016 are comparing it to the libraries listed below
Sorting:
- cicada-2014☆48Updated 2 years ago
- TOR Mail encrypted server for Hidden Services☆40Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- my simple python scripts☆25Updated 2 months ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Updated 10 years ago
- OpenELEC-AntiPrism - The living room secure PC for everyone☆14Updated 8 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- ☆18Updated 9 years ago
- An open source encryption program that uses the "one-time pad" method.☆33Updated 4 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- a javascript keylogger included in a gif file☆38Updated 11 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- This tweaks the motd do be much cooler☆12Updated 8 years ago
- ☆27Updated 9 years ago
- Small UI for the https://coin-hive.com/ mining API☆24Updated 6 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆29Updated 5 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 4 years ago
- Performs a task over (a subset of) all Tor exit relays.☆8Updated 10 years ago
- Code implemented on Rinkeby testnet, along with a wiki guide for the Bug Bounty.☆17Updated 7 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆25Updated 2 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Canari local transforms pcap file analysis☆31Updated 11 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- kali-sly-pi☆33Updated 6 years ago