attrition-org / web-hack-mirrorLinks
A copy of the Attrition.org web page hack / defacement mirror. Details: https://attrition.org/mirror/
☆21Updated 2 years ago
Alternatives and similar repositories for web-hack-mirror
Users that are interested in web-hack-mirror are comparing it to the libraries listed below
Sorting:
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆73Updated last year
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆36Updated last year
- Tips to protect your personal and company data☆28Updated 5 years ago
- A memorial site for Hackers and Infosec people who have passed☆138Updated this week
- Collected and authored guides for personal and operational security.☆63Updated 2 years ago
- Technical notes from investigations into COVID-19 contact-tracing apps☆50Updated 5 years ago
- This repo contains the source for the CVE Services API.☆209Updated this week
- Index and collection of MVT compatibile indicators of compromise.☆99Updated last month
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 5 years ago
- The CVE.ORG website☆88Updated last week
- The open ransomware payment tracker☆98Updated 3 weeks ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆176Updated last year
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆32Updated 5 years ago
- Ahmia's elasticsearch index☆74Updated 3 weeks ago
- ☆25Updated last month
- open source software for journalists to investigate all of the data in the BlueLeaks dataset☆30Updated last week
- Qubes-based SecureDrop Journalist Workstation environment for submission handling☆154Updated last week
- Regular expression for matching .onion Tor links (v2 & v3).☆18Updated 2 years ago
- Checking the status of Russian internet properties (via RIPE Atlas) being targeted by Ukraine's hacktivist "IT ARMY" Telegram group (and …☆18Updated 3 years ago
- AHA! Website Source☆18Updated last month
- ☆15Updated 2 years ago
- Collection of crawlers used by the ahmia search engine☆191Updated 2 weeks ago
- CISOfy Handbook☆33Updated 9 years ago
- Certificate Revocation List monitor☆44Updated last year
- This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forb…☆34Updated last year
- ☆70Updated 5 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆27Updated 7 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆42Updated 3 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆47Updated last year