ternus / nsaproductgenerator
NSA Product Generator!
☆44Updated 8 years ago
Alternatives and similar repositories for nsaproductgenerator:
Users that are interested in nsaproductgenerator are comparing it to the libraries listed below
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 5 years ago
- You'll never take me alive.☆87Updated 10 years ago
- NSA headline generator☆32Updated 10 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- See my shmoocon talk repo for updated code:☆25Updated 11 years ago
- Automated OpenSSH hardening☆42Updated 7 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- SAO/Badge for Tor at Defcon 27☆21Updated 5 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated 10 months ago
- A collection of Hack The Planet's zines.☆71Updated 8 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Updated 9 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆64Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 9 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆33Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- ☆15Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Host files with DNS☆32Updated 8 years ago
- Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference☆37Updated 4 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- USB key cleaner☆59Updated 7 years ago
- Passive DHCP fingerprinting implementation☆50Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Bootkits Revisited☆41Updated 10 years ago
- scripts, etc...☆36Updated 11 months ago