stealth / QI
Quantum Insert/FoxAcid case study
☆15Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for QI
- ☆24Updated 9 years ago
- ☆35Updated 12 years ago
- Splits a single TCP port for a use with multiple services (in the spirit of sslh)☆35Updated 7 years ago
- Project for the Crypto subject at Uni☆18Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆15Updated 8 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 9 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆22Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆17Updated 7 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Simple application for playing with elliptic curves☆42Updated last year
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- ☆17Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated 10 months ago