CISOfy / privacy-guide
Tips to protect your personal and company data
☆28Updated 4 years ago
Alternatives and similar repositories for privacy-guide:
Users that are interested in privacy-guide are comparing it to the libraries listed below
- Checklists☆16Updated 8 years ago
- CISOfy Handbook☆31Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- ☆18Updated last year
- Phishing Toolkit☆20Updated 7 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 7 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆25Updated 2 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- The web site☆14Updated 2 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 2 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated last year
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- apbleed☆24Updated 10 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆18Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- All xxx-arsenal repos in one☆15Updated 6 years ago