pagea / unstyleLinks
An adversarial stylometry application that seeks to help users evade authorship attribution.
☆20Updated 10 years ago
Alternatives and similar repositories for unstyle
Users that are interested in unstyle are comparing it to the libraries listed below
Sorting:
- An ELF parasite command injector.☆34Updated 8 years ago
- ip6.arpa scanner☆32Updated 8 years ago
- Automated OpenSSH hardening☆42Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- Stochastic Traffic Factoring Utility☆15Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- python tor client☆27Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Our aim is to build a multi-party 'off the record' messaging plugin for various clients.☆34Updated 11 years ago
- Real-time chat without using Javascript.☆17Updated 7 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- ☆12Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Updated 12 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 8 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Command-line utility to control Tor.☆89Updated last year
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Crypto scanner☆43Updated 14 years ago