I agree with mass surveillance, but not government corruption. This is the result.
☆11Jun 20, 2020Updated 5 years ago
Alternatives and similar repositories for antisurveillance
Users that are interested in antisurveillance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Realistic Rendering, Terrain Generation, and Physics Simulation Engine☆14Dec 17, 2015Updated 10 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆19Mar 21, 2020Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 8 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆35Apr 25, 2017Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- sample linux x86_64 ELF virus☆54Jun 25, 2018Updated 7 years ago
- Challenges where you can practice heap tecnics☆25Nov 18, 2017Updated 8 years ago
- The hottest login theme around for KDE Plasma 5☆14Nov 12, 2018Updated 7 years ago
- Parse transformer for use new OTP functions in old Erlang/OTP releases☆12Mar 30, 2026Updated 2 weeks ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- FIX (Foreign Information Exchange) protocol implementation for Erlang☆11Dec 16, 2017Updated 8 years ago
- An ELF parasite command injector.☆34Oct 24, 2017Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆37Apr 14, 2015Updated 11 years ago
- A writeup for things found and theories regarding the Mr Robot Season 3 ARG☆18Dec 12, 2017Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 14 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Erlang Package Manager☆69Aug 2, 2011Updated 14 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- FreeBSD daemon that watches files and runs commands when they change☆15Jan 30, 2023Updated 3 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 8 months ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 3 months ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- WLAN Receiver for GNU Radio on Android☆13Aug 4, 2020Updated 5 years ago