x0rz / tweetentropy
Twitter as an extra entropy source
☆100Updated 6 years ago
Alternatives and similar repositories for tweetentropy:
Users that are interested in tweetentropy are comparing it to the libraries listed below
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- A collection of Hack The Planet's zines.☆71Updated 8 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Getting Envisioncollision to actually work.☆12Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Hunting cryptonote-related miners☆22Updated 4 years ago
- Secure/anonymous IRC-like chat using TOR hidden services☆40Updated 11 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆38Updated 7 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆85Updated 2 years ago
- cicada-2014☆47Updated 2 years ago
- Truehunter☆31Updated 3 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Lightweight TCP botnet coded in C++☆27Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 3 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Panic button for protection against cold boot attacks☆140Updated 3 years ago