seeess / Defcon-Tor-27
SAO/Badge for Tor at Defcon 27
☆21Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Defcon-Tor-27
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 5 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 9 months ago
- **Abandoned** Tomu+ board - no longer under development!☆14Updated 6 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆42Updated 5 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago
- people's cloud: using the ideas of botnets for good☆38Updated 7 years ago
- Cooperative RSA signing☆25Updated 4 years ago
- An experimental file formats playground☆85Updated last year
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- quite a big hexdump display☆86Updated last year
- Airprobe for frequency hopping GSM channels☆26Updated 10 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆25Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- A collection of crackmes☆39Updated 5 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆43Updated 3 years ago
- Historic password hashing algorithms☆18Updated 4 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆11Updated 4 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 4 years ago
- Top hat with 1024 addressable LEDs and glitter felt.☆26Updated 7 years ago
- A javascript network simulator for the disaster.radio routing protocol☆32Updated 4 years ago
- the cyber crypto cryptocoin☆35Updated 6 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 7 years ago
- generate pgp keys with vanity fingerprints☆17Updated 7 years ago