DavidJacobson / SafeTextLinks
Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.
☆137Updated 5 years ago
Alternatives and similar repositories for SafeText
Users that are interested in SafeText are comparing it to the libraries listed below
Sorting:
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Truehunter☆31Updated 4 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- detectem - detect software and its version on websites.☆156Updated 4 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- Panic button for protection against cold boot attacks☆143Updated 3 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- ☆56Updated 7 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Recon system hardening scanner☆46Updated 8 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 10 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- python tor client☆27Updated 9 years ago
- ☆9Updated 7 years ago
- a fully python Diffie-Hellman Library☆51Updated 7 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- ☆14Updated 4 years ago