seeess / Defcon-Tor-27
SAO/Badge for Tor at Defcon 27
☆21Updated 5 years ago
Alternatives and similar repositories for Defcon-Tor-27:
Users that are interested in Defcon-Tor-27 are comparing it to the libraries listed below
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- USB key cleaner☆60Updated 7 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 2 months ago
- people's cloud: using the ideas of botnets for good☆38Updated 7 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Cooperative RSA signing☆26Updated 4 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- The noise swiss army knife☆44Updated 4 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Code etc for the badge creation and payloads☆11Updated 4 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Updated 5 years ago
- FluxN0de☆15Updated 3 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 7 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- quotes i like.☆15Updated 5 years ago
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Updated 4 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Desfire card library for Python☆18Updated 7 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- a collection of teaching resources☆12Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- USB armory - hardware control tool☆29Updated 2 months ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Updated 3 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆88Updated 6 years ago