bengrosser / scaremailLinks
Makes email "scary" to disrupt NSA surveillance
☆35Updated 11 years ago
Alternatives and similar repositories for scaremail
Users that are interested in scaremail are comparing it to the libraries listed below
Sorting:
- Personal Depersonalization System☆10Updated 9 years ago
- Steal xfinity-comcast subscriber credentials.☆33Updated 9 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Local Transforms for the Maltego OSINT investigative tool that act on FetLife.com.☆40Updated 5 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago
- A simple script for translating IP addresses to GeoLocations☆42Updated 3 years ago
- social media intelligence from the command line☆44Updated 3 months ago
- Fast iOS executable dumper☆27Updated 11 years ago
- Checklist for securing communications☆38Updated 5 years ago
- Spot the Surveillance is an open-source educational VR tool to help people identify street-level surveillance in their community. As each…☆37Updated 4 years ago
- Checks to see when the cert for a given domain expires.☆19Updated 3 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 9 years ago
- Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to …☆67Updated 2 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- A repository for personal tracking.☆15Updated 3 years ago
- Collection of data about URL filtering in various countries☆42Updated 8 years ago
- A Cracking Tool for open Wifis with login pages☆22Updated 12 years ago
- [unofficial fork] RAR bruteforce cracker☆41Updated 7 years ago
- Tool for OSINT forensic analysis, search and graphing of communications content such as email MBOX files and CSV text message data using …☆80Updated 2 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 3 years ago
- Identify connection of sessions for social engineering attacks.☆57Updated 8 years ago
- A python tool that will extract exif data from picture with two methods☆39Updated 3 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆68Updated 3 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆16Updated 11 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆21Updated 3 years ago
- A collection of awesome web crawler,spider in different languages☆12Updated 7 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆40Updated 3 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago