quickbundle / hackingLinks
☆12Updated 8 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- A small collection of scripts that I've written for various needs.☆28Updated last month
- ☆17Updated 11 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Complete examples of solidity exploits☆13Updated 7 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆12Updated 8 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 4 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- An advanced memory forensics framework☆25Updated 10 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 9 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ☆35Updated 13 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Public resources NB shares☆18Updated 9 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- free crypto audit☆31Updated 8 years ago