brndnmtthws / protect-yourselfLinks
A guide on how to protect your digital assets
☆11Updated last year
Alternatives and similar repositories for protect-yourself
Users that are interested in protect-yourself are comparing it to the libraries listed below
Sorting:
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Some good feeds for people who seriously want to keep up to date with InfoSec news and tech☆13Updated 7 years ago
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Checklists☆16Updated 9 years ago
- Single-threaded epoll-based concurrent bulk whois client☆32Updated 8 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Updated 6 years ago
- ☆23Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated last year
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- apbleed☆24Updated 11 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Various exploits☆10Updated 8 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- A static website template for security pages.☆52Updated 3 months ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 5 years ago
- Docker image for PowerShell remoting from Linux to Windows☆36Updated 6 years ago
- Add your configs for tmux☆18Updated 3 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago