quickbundle / hackingLinks
☆12Updated 8 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- ☆17Updated 10 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- ARP Poisoning Defense Scripts☆38Updated 7 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 9 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 4 years ago
- Script to scan sites for images containing embedded EXIF metadata☆14Updated 12 years ago
- ☆12Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- A small collection of scripts that I've written for various needs.☆28Updated last week
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 4 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- ☆32Updated 11 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- XSS exploitation tool - access victims through HTTP proxy☆159Updated 11 years ago
- ☆25Updated 8 years ago