pagea / unstyle
An adversarial stylometry application that seeks to help users evade authorship attribution.
☆19Updated 9 years ago
Alternatives and similar repositories for unstyle:
Users that are interested in unstyle are comparing it to the libraries listed below
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- ☆39Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- python tor client☆27Updated 9 years ago
- Our aim is to build a multi-party 'off the record' messaging plugin for various clients.☆34Updated 11 years ago
- Network white noise collector☆18Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- ☆17Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- ☆12Updated 8 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Updated 5 years ago
- Bypass Google's Santa☆22Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- UDPack is an extensible generic UDP packet obfuscator.☆22Updated 5 years ago
- The grey fox☆25Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Updated 9 years ago
- Python Application to Reverse Freezing☆36Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- OS X rootkit loader version #1☆18Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 8 years ago