imprintjs[INACTIVE] Javascript library for browser fingerprinting
Stars: ✭ 77 (-78.73%)
refingerprintA more refined fingerprinting module based on Fingerprint2.js
Stars: ✭ 34 (-90.61%)
VytalBrowser extension to spoof timezone, geolocation, locale and user agent.
Stars: ✭ 1,449 (+300.28%)
FingerprintjsBrowser fingerprinting library with the highest accuracy and stability.
Stars: ✭ 15,481 (+4176.52%)
WhatwafDetect and bypass web application firewalls and protection systems
Stars: ✭ 1,881 (+419.61%)
FingerprintjsBrowser fingerprinting library with the highest accuracy and stability.
Stars: ✭ 15,481 (+4176.52%)
ssldumpssldump - (de-facto repository gathering patches around the cyberspace)
Stars: ✭ 160 (-55.8%)
FattFATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Stars: ✭ 490 (+35.36%)
cryptoniceCryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your internet or internal facing web services. Built using the sslyze API and ssl, http-client and dns libraries, cryptonice collects data on a given domain and performs a series of tests to check TLS configuration…
Stars: ✭ 91 (-74.86%)
BetterDiscordPlugins🔥 My collection of Discord plugins for BetterDiscord, the Discord enhancement project
Stars: ✭ 120 (-66.85%)
FPStalkerRepo of code for FPStalker article
Stars: ✭ 24 (-93.37%)
sslcliPretty awesome command-line client for public SSLLabs API
Stars: ✭ 17 (-95.3%)
dhash-vipsvips-powered ruby gem to measure images similarity, implementing dHash and IDHash algorithms
Stars: ✭ 75 (-79.28%)
tipiTipi - the All-in-one Web Server for Ruby Apps
Stars: ✭ 214 (-40.88%)
ipsourcebypassThis Python script can be used to bypass IP source restrictions using HTTP headers.
Stars: ✭ 326 (-9.94%)
harddnsRFC8484 and DoH/JSON resolver
Stars: ✭ 35 (-90.33%)
waycupA minimal tool that hides your online assets from online security scanners, researchers and hackers.
Stars: ✭ 100 (-72.38%)
FingerprintAndroid library that simplifies the process of fingerprint authentications.
Stars: ✭ 68 (-81.22%)
duffPure OCaml implementation of libXdiff (Rabin's fingerprint)
Stars: ✭ 20 (-94.48%)
MQTTnetMQTTnet is a high performance .NET library for MQTT based communication. It provides a MQTT client and a MQTT server (broker). The implementation is based on the documentation from http://mqtt.org/.
Stars: ✭ 3,309 (+814.09%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (-57.46%)
win-caGet Windows System Root certificates
Stars: ✭ 78 (-78.45%)
contrunoA TLS termination proxy as a MirageOS
Stars: ✭ 13 (-96.41%)
Prox5🧮 SOCKS5/4/4a 🌾 validating proxy pool and upstream SOCKS5 server for 🤽 LOLXDsoRANDum connections 🎋
Stars: ✭ 39 (-89.23%)
utlsFork of the Go standard library with unsafe extensions, for expert clients with unusual needs.
Stars: ✭ 19 (-94.75%)
Me-e--bypasserThis Discord Bot bypasses a premium feature of the Bot Mee6, so that you can use it for free.
Stars: ✭ 74 (-79.56%)
hyper-proxyA proxy connector for Hyper-based crates
Stars: ✭ 73 (-79.83%)
tlsassistantFully-featured tool that combines state-of-the-art TLS analyzers with a report system that suggests appropriate mitigations and shows the full set of viable attacks.
Stars: ✭ 24 (-93.37%)
p3yA single binary reverse proxy written in go. It was developed for use in Kubernetes, to wrap services like Prometheus with simple BasicAuth and TLS encryption.
Stars: ✭ 15 (-95.86%)
fingerprintjs-pro-iosOfficial iOS/tvOS agent & SDK for accurate device identification, created for the Fingerprint Pro identification API.
Stars: ✭ 35 (-90.33%)
k8s-webhook-cert-managerGenerate certificate suitable for use with any Kubernetes Mutating Webhook.
Stars: ✭ 59 (-83.7%)
helm-certgenHelm plugin for generation of TLS certificates
Stars: ✭ 15 (-95.86%)
iot security《密码技术与物联网安全——mbedtls开发实战》示例代码
Stars: ✭ 111 (-69.34%)
pagesigner-cliRun PageSigner from the command line
Stars: ✭ 31 (-91.44%)
vault-pki-monitor-venafiVenafi PKI Monitoring Secrets Engine for HashiCorp Vault that enforces security policy and provides certificate visiblity to the enterprise.
Stars: ✭ 18 (-95.03%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (-82.6%)
Artalk.XmppThis repository contains an easy-to-use and well-documented .NET (Framework and Core 3.1, .Net 5 and .Net 6) assembly for communicating with an XMPP server. It supports basic Instant Messaging and Presence funtionality as well as a variety of XMPP extensions.
Stars: ✭ 42 (-88.4%)
python-mbedtlsCryptographic library with an mbed TLS back end
Stars: ✭ 64 (-82.32%)
idris2-tlsA portable idris2 implementation of TLS
Stars: ✭ 25 (-93.09%)
steady-tunSecure TLS tunnel with pool of prepared upstream connections
Stars: ✭ 37 (-89.78%)
netxduoAzure RTOS NetX Duo is an advanced, industrial-grade TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications
Stars: ✭ 151 (-58.29%)
PageSignerClient for the TLSNotary protocol (Chromium extension).
Stars: ✭ 63 (-82.6%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-60.77%)
4xxBypassera tool to bypass negative HTTP status codes on the client side (4xx)
Stars: ✭ 22 (-93.92%)
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-91.99%)
docker-ssl-reverse-proxyEasy-to-use auto-SSL reverse proxy as a Docker container based on Caddy and Let’s Encrypt
Stars: ✭ 22 (-93.92%)
hudsuckerIntercepting HTTP/S proxy
Stars: ✭ 114 (-68.51%)
safeminer全网第一款本地连接矿池加密软件,隐藏本地ip、加密数据包、流量混淆,可实现防止被监管的目的
Stars: ✭ 8 (-97.79%)
Chromium-GostChromium с поддержкой алгоритмов ГОСТ
Stars: ✭ 286 (-20.99%)
OpensslTLS/SSL and crypto library
Stars: ✭ 17,157 (+4639.5%)
Mobile Phone TrackingThis repository is source code for some of the attacks defined in this paper (https://arxiv.org/pdf/1703.02874v1.pdf). Not all attacks will be available. Please read the README.md
Stars: ✭ 20 (-94.48%)
Illustrated TlsThe Illustrated TLS Connection: Every byte explained
Stars: ✭ 2,751 (+659.94%)