seeess / Defcon-Tor-27Links
SAO/Badge for Tor at Defcon 27
☆21Updated 6 years ago
Alternatives and similar repositories for Defcon-Tor-27
Users that are interested in Defcon-Tor-27 are comparing it to the libraries listed below
Sorting:
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Cooperative RSA signing☆27Updated 5 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 9 months ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Linger is a small, portable device that allows you to create and blend into a virtual crowd.☆102Updated last year
- An experimental file formats playground☆87Updated 2 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwares☆51Updated 6 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- A (hopefully) unbiased timeline of events related to accusations against Jacob Appelbaum☆20Updated 8 years ago
- Good-enough Hex Editor/Annotator☆24Updated 5 years ago
- USB key cleaner☆62Updated 8 years ago
- BusKill kill cord for Linux☆35Updated 5 years ago
- FluxN0de☆15Updated 3 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 4 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- Password manager for USB Armory☆37Updated 10 years ago
- Privacy enhanced instant messenger☆44Updated 6 years ago
- Decentralized web Gateway for Internet Archive☆21Updated 5 years ago
- Hide secret information in typographical errors☆32Updated 9 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Code samples for the Tomu board☆81Updated 2 months ago
- "RansomPKP" proof of concept.☆11Updated 9 years ago
- ☆32Updated 5 years ago
- Contact Tracing BLE sniffer PoC☆82Updated 4 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Updated 4 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- A collection of crackmes☆40Updated 10 months ago
- people's cloud: using the ideas of botnets for good☆39Updated 8 years ago