mikeguidry / antisurveillanceView external linksLinks
I agree with mass surveillance, but not government corruption. This is the result.
☆11Jun 20, 2020Updated 5 years ago
Alternatives and similar repositories for antisurveillance
Users that are interested in antisurveillance are comparing it to the libraries listed below
Sorting:
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 8 years ago
- Linux backdoor using ICMP payload for activation☆11Nov 18, 2014Updated 11 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Challenges where you can practice heap tecnics☆24Nov 18, 2017Updated 8 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆35Apr 25, 2017Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- GRAnd: Extra blocks, IO, and tools for GNU Radio on Android☆10Aug 27, 2015Updated 10 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Antenna Sector Patterns as obtained by Measurements in the CoNEXT'17 paper☆15Jan 24, 2019Updated 7 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 6 months ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 7 years ago
- GDB scripts☆14Nov 30, 2012Updated 13 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- Git repository to browse the XNU releases from☆10Sep 20, 2021Updated 4 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 4 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Whale FM archive, data☆16Mar 4, 2015Updated 10 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- The purpose of this document is to provide guidance required for sensor data producers and consumers to implement a sensor information en…☆11Dec 17, 2020Updated 5 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago