quickbundle / hackingLinks
☆12Updated 8 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Military-Grade Password Manager☆12Updated 8 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 9 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- ☆17Updated 10 years ago
- Security scanner to find temporary config files that contain passwords on public websites☆74Updated 13 years ago
- ☆12Updated 8 years ago
- A small collection of scripts that I've written for various needs.☆28Updated 2 weeks ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 4 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆14Updated 7 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 4 years ago
- Complete examples of solidity exploits☆13Updated 7 years ago
- Stock photo assets of real hackers☆15Updated 9 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 5 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- A password generator.☆82Updated 4 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- EFF's Tracker Blocking Laboratory is an experimental project to test heuristic blocking of non-consensual online tracking. It's based on …☆11Updated 11 years ago
- Security audit tool for Encrypt.to☆14Updated 10 years ago
- Command-line utility to control Tor.☆89Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 11 months ago