pagea / unstyleLinks
An adversarial stylometry application that seeks to help users evade authorship attribution.
☆20Updated 10 years ago
Alternatives and similar repositories for unstyle
Users that are interested in unstyle are comparing it to the libraries listed below
Sorting:
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Data package with attacks against civil society☆13Updated 9 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Our aim is to build a multi-party 'off the record' messaging plugin for various clients.☆34Updated 11 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- ☆13Updated 7 years ago
- Lightweight easy to use password manager☆10Updated 6 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in th…☆33Updated 2 years ago
- python tor client☆27Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- go package for indexing and querying certain aspects of bgp dumps and some other things.☆14Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- kills all TCP connections on a network☆40Updated 9 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago