x0rz / tweetentropyLinks
Twitter as an extra entropy source
☆103Updated 6 years ago
Alternatives and similar repositories for tweetentropy
Users that are interested in tweetentropy are comparing it to the libraries listed below
Sorting:
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆38Updated 5 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Truehunter☆31Updated 4 years ago
- cicada-2014☆49Updated 2 years ago
- ☆18Updated 11 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 8 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- LIFARS Networking Security GNU/Linux distro☆27Updated 6 years ago
- A collection of crackmes☆40Updated 5 months ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Updated 7 years ago
- Getting Envisioncollision to actually work.☆14Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆54Updated 3 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago