pagea / unstyle
An adversarial stylometry application that seeks to help users evade authorship attribution.
☆19Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for unstyle
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 9 years ago
- A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in th…☆32Updated 2 years ago
- Extract Typelib Data from portable executables (recursively within a directory)☆12Updated 15 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 8 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 7 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- Network white noise collector☆18Updated 8 years ago
- Maltego Transforms to Query Traffic Records☆33Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Easily write tests and fuzz many different programs.☆12Updated last year
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆33Updated 8 months ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 9 years ago
- Browser extension that complements the PhishDetect service☆21Updated last year
- U3 armory - exploiting the AutoRunz☆22Updated 7 years ago
- End-to-End encrypted Tor2Web gateway☆37Updated 4 years ago
- Every document published from the Snowden archive☆64Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Graphical analysis of PDF structure.☆12Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- ☆34Updated 2 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Network aware keylogger: broadcasting on your local area network.☆20Updated 11 years ago
- python-deepviz is a python wrapper for deepviz.com REST APIs☆11Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago