quickbundle / hackingLinks
☆12Updated 9 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- An android front-end to the zcash wallet through onion services☆14Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- ☆17Updated 11 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- ☆12Updated 9 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- ☆24Updated 4 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 4 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- ☆35Updated 13 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- free crypto audit☆31Updated 8 years ago
- ☆32Updated 11 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 9 years ago
- Auditing Applied Cryptography☆11Updated 6 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- Using SGX to harden password hashing☆34Updated 10 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Updated 13 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago