scream314 / cicada3301Links
☆130Updated 2 years ago
Alternatives and similar repositories for cicada3301
Users that are interested in cicada3301 are comparing it to the libraries listed below
Sorting:
- 3301 - Unmodified files, transcription and other assets.☆188Updated 2 years ago
- A guide to downloading all public DDoSecrets releases via torrent☆76Updated this week
- cicada-2014☆49Updated 3 years ago
- A possible method for faster-than-light communication☆43Updated 2 years ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆200Updated last year
- Command-line monitor for Tor.☆144Updated last year
- Liber Primus Translator☆18Updated 7 years ago
- Thirteen Years of Tor Attacks☆331Updated 2 years ago
- Collection of crawlers used by the ahmia search engine☆211Updated last week
- Source code for my crackstation.net website.☆169Updated 4 years ago
- Create a ZIPBomb for a given uncompressed size (flat and nested modes).☆101Updated 5 years ago
- :(){ :|: };: 💣 Fork bombs (wabbits) in many languages. Spot them before executing any code so that you can prevent yourself from acciden…☆44Updated 3 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Figlet fonts for crimes☆48Updated 2 years ago
- A set of scripts to list tor hidden services☆181Updated 3 months ago
- A tiny Tor client implementation (in pure python).☆132Updated 2 years ago
- Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers☆29Updated 8 years ago
- Universal steganographic tool☆320Updated 4 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆46Updated last week
- BlackArch Linux ISOs☆262Updated last week
- Rainbow table attack☆17Updated 10 years ago
- The PsychonautWiki API.☆73Updated last week
- Detect hidden files and text in images☆126Updated 2 years ago
- A repository of methods of bypassing GPT and ChatGPT content filters☆85Updated 2 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆47Updated 6 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆125Updated 8 years ago
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆310Updated 2 weeks ago
- ☆698Updated last year
- Pipeline of a keylogging attack using just an audio signal and unsupervised learning.☆154Updated 3 years ago
- This is the github repository for all NSA and CIA spying servers, including those revealed by Edward Snowden and other studies we conduct…☆135Updated last year