seeess / Defcon-Tor-27
SAO/Badge for Tor at Defcon 27
☆21Updated 5 years ago
Alternatives and similar repositories for Defcon-Tor-27:
Users that are interested in Defcon-Tor-27 are comparing it to the libraries listed below
- NXP Security Controller (SCCv2) - Linux driver☆19Updated last year
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- An experimental file formats playground☆86Updated last year
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆43Updated 5 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- SHA-3 implementation for 8-bit AVR☆9Updated 6 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆10Updated 9 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- The Sparkle Shield is an add-on shield for Arduino that has 70 individually programmable full color LEDs arranged in a 7x10 matrix.☆11Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- USB key cleaner☆59Updated 7 years ago
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆22Updated last year
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- **Abandoned** Tomu+ board - no longer under development!☆14Updated 6 years ago
- Historic password hashing algorithms☆18Updated 4 years ago
- ☆49Updated 8 years ago
- Browser extension that complements the PhishDetect service☆21Updated last year
- Template repository for getting started with general Amaranth FPGA projects☆15Updated 7 months ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 7 years ago
- Cooperative RSA signing☆26Updated 4 years ago
- A replacement for nanosleep() procedure, for better nanoseconds resolution☆16Updated 4 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- Scan for signal peaks with RTL-SDR☆33Updated 11 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago