vikasnkumar / wisecrackerLinks
Wisecracker is a high performance distributed cryptanalysis framework.
☆49Updated 8 years ago
Alternatives and similar repositories for wisecracker
Users that are interested in wisecracker are comparing it to the libraries listed below
Sorting:
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- ☆12Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 12 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 10 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆152Updated 6 years ago
- Threatbutt Suite☆37Updated 10 years ago
- ☆35Updated 13 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- ☆15Updated 9 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 11 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆121Updated 5 years ago
- ☆44Updated 8 years ago
- ☆14Updated 10 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago