x0rz / tweetentropyLinks
Twitter as an extra entropy source
☆104Updated 7 years ago
Alternatives and similar repositories for tweetentropy
Users that are interested in tweetentropy are comparing it to the libraries listed below
Sorting:
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 6 years ago
- cicada-2014☆50Updated 3 years ago
- A collection of Hack The Planet's zines.☆72Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- Hacker OPSEC☆100Updated 7 years ago
- Getting Envisioncollision to actually work.☆14Updated 8 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆90Updated 3 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- TXT and PDF documents from the NSA☆188Updated 10 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation☆135Updated 2 months ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- A collection of fraud related tools for research.☆151Updated 6 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 10 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- A tiny Tor client implementation (in pure python).☆133Updated 2 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago