x0rz / tweetentropy
Twitter as an extra entropy source
☆100Updated 6 years ago
Alternatives and similar repositories for tweetentropy:
Users that are interested in tweetentropy are comparing it to the libraries listed below
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- A collection of Hack The Planet's zines.☆71Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- LIFARS Networking Security GNU/Linux distro☆26Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Hunting cryptonote-related miners☆22Updated 4 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Network based protocol fuzzer☆70Updated 3 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆97Updated 3 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- ☆44Updated last month
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Updated 6 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆37Updated 5 years ago
- A shellcode testing harness.☆69Updated 8 months ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- ☆18Updated 11 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago