DavidJacobson / SafeTextLinks
Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.
☆136Updated 6 years ago
Alternatives and similar repositories for SafeText
Users that are interested in SafeText are comparing it to the libraries listed below
Sorting:
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Transfer files from Air gapped machines using QR codes☆112Updated 4 years ago
- Code execution via Python package installation.☆170Updated 6 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Truehunter☆31Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- detectem - detect software and its version on websites.☆157Updated 4 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 7 years ago
- An information gathering tool to collect git commit emails in version control host services☆153Updated 6 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- CERT Tapioca for MITM network analysis☆184Updated last year
- ☆147Updated 9 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- documentation and writing☆42Updated 7 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆145Updated 4 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆25Updated 8 years ago
- Implements a simple nested grammar for expanding passwords☆161Updated 2 years ago
- proxy poc implementation of STARTTLS stripping attacks☆171Updated 3 years ago
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Leak File Analyzer☆62Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago