x0rz / tweetentropy
Twitter as an extra entropy source
☆98Updated 6 years ago
Related projects: ⓘ
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- ssh public host key scanner using shodan☆116Updated 5 years ago
- Detect snooper on your system!☆82Updated 7 years ago
- A collection of Hack The Planet's zines.☆71Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆42Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆95Updated 2 years ago
- LIFARS Networking Security GNU/Linux distro☆25Updated 6 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆52Updated 2 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 6 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Updated 7 years ago
- Clone of hidden tear written in C++☆70Updated 3 years ago
- ☆52Updated this week
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 6 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 6 years ago
- cicada-2014☆48Updated 2 years ago
- ☆51Updated this week
- Source code to the Malicious Demon Hunter Exploit Kit☆56Updated 9 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Truehunter☆29Updated 3 years ago
- irc bot to scan & bruteforce ssh/telnet☆6Updated 5 years ago
- Panic button for protection against cold boot attacks☆138Updated 2 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- A short and small memory forensics helper.☆52Updated 6 years ago
- General tools and scripts i want to make public to the world.☆44Updated 5 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆54Updated 6 years ago