seeess / Defcon-Tor-27
SAO/Badge for Tor at Defcon 27
☆21Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Defcon-Tor-27
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Cooperative RSA signing☆25Updated 4 years ago
- USB key cleaner☆59Updated 7 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆17Updated 3 years ago
- Historic password hashing algorithms☆18Updated 4 years ago
- FluxN0de☆15Updated 2 years ago
- Web of trust grapher☆39Updated 7 months ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 9 months ago
- generate pgp keys with vanity fingerprints☆17Updated 7 years ago
- Tools for flashing a USR5686G modem☆20Updated 4 years ago
- View and edit files in hexadecimal or in ASCII☆9Updated 4 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆42Updated 5 years ago
- Good-enough Hex Editor/Annotator☆24Updated 4 years ago
- Hide secret information in typographical errors☆32Updated 8 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆25Updated 8 years ago
- Intro to Assembly Optimization stream repo☆25Updated 2 years ago
- USB armory - boot loader☆34Updated last month
- Code samples for the Tomu board☆80Updated 2 years ago
- A tool to help you understand TPM commands and responses.☆34Updated last month
- Wrap a TCP connection over two HTTP connections, Previously named "RunAround"☆26Updated 10 years ago
- BusKill kill cord for Linux☆31Updated 4 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Updated 3 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆11Updated 4 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆42Updated 3 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 5 years ago
- The tools used for the DNS spies blog post☆50Updated 6 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago