x0rz / tweetentropy
Twitter as an extra entropy source
☆100Updated 6 years ago
Alternatives and similar repositories for tweetentropy
Users that are interested in tweetentropy are comparing it to the libraries listed below
Sorting:
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Getting Envisioncollision to actually work.☆13Updated 7 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆37Updated 5 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- cicada-2014☆48Updated 2 years ago
- Truehunter☆31Updated 3 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆86Updated 2 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler☆80Updated 5 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Some exploits and exploit development stuff.☆147Updated 3 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆87Updated 6 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆152Updated 4 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago