xen0bit / botnet-fishbowlLinks
Use random bot scanning the internet to seed a Conways Game of Life running on a small LCD on my desk
☆40Updated 4 years ago
Alternatives and similar repositories for botnet-fishbowl
Users that are interested in botnet-fishbowl are comparing it to the libraries listed below
Sorting:
- ☆231Updated 2 years ago
- The DC801 Badge Platform for DC28+☆58Updated 2 months ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆344Updated 2 years ago
- Binary Golf Examples and Resources☆256Updated last year
- Binary Golf Grand Prix☆112Updated last year
- Binary Protocol Differ☆119Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 3 months ago
- A collection of tools for generating models of physical keys for 3D printing☆189Updated 6 years ago
- #CyberBarcode☆67Updated last year
- A collection of scanned, high-resolution Hacker / Information Security Stickers from various conferences☆45Updated 5 years ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 2 years ago
- Advanced: Bluetooth low energy capture the flag☆60Updated 2 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆300Updated 6 months ago
- LOGO'S for I VOID WARRANTIES (FOR A LIVING) stickers☆33Updated last year
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- ☆146Updated 11 months ago
- ☆74Updated 4 years ago
- random dissectors☆67Updated 2 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆215Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆91Updated 3 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- A fast and secure multi protocol honeypot.☆323Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆307Updated 3 years ago
- Heap Exploitation Resources☆20Updated 2 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated 8 months ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year