aforensics / HiddenVM
HiddenVM — Use any desktop OS without leaving a trace.
☆2,323Updated 2 months ago
Related projects: ⓘ
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆3,485Updated this week
- TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access p…☆3,078Updated 4 months ago
- 💾 dn - offline full-text search and archiving for your Chromium-based browser.☆3,757Updated 3 weeks ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆1,786Updated this week
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,331Updated 2 months ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆10,698Updated last week
- Tracking history of USB events on GNU/Linux☆1,153Updated last year
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,621Updated 8 months ago
- A temporary email right from your terminal written in POSIX sh☆3,853Updated last month
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,895Updated last year
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,409Updated 6 months ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,821Updated last year
- Connect like there is no firewall. Securely.☆1,458Updated 2 weeks ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,602Updated 6 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,565Updated 2 years ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,519Updated 10 months ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,218Updated 2 weeks ago
- SkySafe Miscellaneous Reverse Engineering Blog☆754Updated 8 months ago
- Simple, native and efficient local ad blocker. Only Bash.☆1,776Updated last month
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,178Updated 3 years ago
- Execute a local command using the processing power of another Linux machine.☆3,122Updated last year
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,029Updated 4 years ago
- Penetrum LLC opensource security tool list.☆647Updated 2 years ago
- My simple Swiss Army knife for http/https troubleshooting and profiling.☆3,749Updated 2 months ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,408Updated last year
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆9,911Updated 4 years ago
- A pretty sweet vulnerability scanner☆4,052Updated 6 months ago
- SSH tarpit that slowly sends an endless banner☆7,130Updated 3 months ago
- 🌀 Browse the web from a web page. Remote browser isolation. For security, privacy and more! By https://dosyago.com☆3,375Updated this week
- Official git repo for iodine dns tunnel☆6,155Updated 2 months ago