CISOfy / privacy-guideLinks
Tips to protect your personal and company data
☆28Updated 5 years ago
Alternatives and similar repositories for privacy-guide
Users that are interested in privacy-guide are comparing it to the libraries listed below
Sorting:
- Checklists☆17Updated 8 years ago
- CISOfy Handbook☆33Updated 9 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- ☆16Updated last year
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 7 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆21Updated 8 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- [ARCHIVED] Please report to https://github.com/funilrys/PyFunceble.☆30Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- The web site☆14Updated 2 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- A simple script for translating IP addresses to GeoLocations☆46Updated 3 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆15Updated 3 years ago
- Man-in-the-middle against Tor bridges☆27Updated 5 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆62Updated last month
- Network white noise collector☆19Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆21Updated 8 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago