oblivia-simplex / monsoon
A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".
☆13Updated 4 years ago
Alternatives and similar repositories for monsoon:
Users that are interested in monsoon are comparing it to the libraries listed below
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- ☆26Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Parallel APK analyzer☆51Updated 8 years ago
- Certificate Expiration Monitor script☆27Updated 6 years ago
- ☆12Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- ☆15Updated 9 years ago
- ☆27Updated 7 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- ☆36Updated 12 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- free crypto audit☆31Updated 8 years ago
- lte security☆41Updated 9 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- ☆15Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago