mkrultra / space-readsLinks
A big list of space book and whitepaper recommendations.
☆100Updated 5 years ago
Alternatives and similar repositories for space-reads
Users that are interested in space-reads are comparing it to the libraries listed below
Sorting:
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 8 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 8 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆336Updated 8 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 10 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Medfusion 4000 security research & a MQX RCE.☆338Updated 7 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- A machine learning based social media pen-testing tool☆151Updated 8 years ago
- food food food☆236Updated 2 weeks ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- Searches for pronbots by looking at followers/following☆92Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Overview Tooling Process Physical People☆46Updated 4 years ago
- WiFi Tracker Confuser☆64Updated 8 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆257Updated 9 months ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆17Updated 4 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 10 years ago
- A deliberately-vulnerable website and exercises for teaching about the OWASP Top 10☆187Updated last year
- Vulnerable Web applications Generator☆84Updated 7 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago