DavidJacobson / SafeText
Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.
☆137Updated 5 years ago
Alternatives and similar repositories for SafeText:
Users that are interested in SafeText are comparing it to the libraries listed below
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- ☆10Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Removed according to regulations☆35Updated 7 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 9 years ago
- Truehunter☆31Updated 3 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 4 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆152Updated 4 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Updated 7 years ago
- A shellcode testing harness.☆69Updated 9 months ago
- ☆11Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 3 months ago
- Parallel APK analyzer☆51Updated 8 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Code execution via Python package installation.☆170Updated 6 years ago