pagea / unstyle
An adversarial stylometry application that seeks to help users evade authorship attribution.
☆19Updated 9 years ago
Alternatives and similar repositories for unstyle:
Users that are interested in unstyle are comparing it to the libraries listed below
- An ELF parasite command injector.☆34Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Every document published from the Snowden archive☆66Updated 9 years ago
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Network white noise collector☆18Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 10 months ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Updated 9 years ago
- Repo for the paper "USB Devices phoning home"☆22Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Easily write tests and fuzz many different programs.☆12Updated 2 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- ☆38Updated 8 years ago
- ☆30Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆11Updated 8 years ago