DavidJacobson / SafeTextLinks
Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.
☆138Updated 6 years ago
Alternatives and similar repositories for SafeText
Users that are interested in SafeText are comparing it to the libraries listed below
Sorting:
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- detectem - detect software and its version on websites.☆157Updated 4 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Use security tools from within IRC.☆24Updated 13 years ago
- Truehunter☆31Updated 4 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- Recon system hardening scanner☆47Updated 9 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Implements a simple nested grammar for expanding passwords☆160Updated 2 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- A fully featured malware scanner for Linux desktops and servers.☆68Updated 3 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆143Updated 4 years ago
- ☆56Updated 8 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆88Updated 3 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago