pagea / unstyleLinks
An adversarial stylometry application that seeks to help users evade authorship attribution.
☆20Updated 10 years ago
Alternatives and similar repositories for unstyle
Users that are interested in unstyle are comparing it to the libraries listed below
Sorting:
- An ELF parasite command injector.☆34Updated 7 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- python tor client☆27Updated 10 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Command-line utility to control Tor.☆89Updated last year
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Passive DHCP fingerprinting implementation☆50Updated 9 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- RFC8484 and DoH/JSON resolver☆42Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- ☆12Updated 8 years ago
- Miscellaneous Tools☆38Updated 10 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆79Updated 5 years ago
- lte security☆41Updated 9 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 3 years ago
- ☆39Updated 9 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- ip6.arpa scanner☆32Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 10 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago