charlesreid1 / charlesreid1-awesome
An awesome list for all the awesome stuff I do. 🕶️
☆29Updated last year
Alternatives and similar repositories for charlesreid1-awesome:
Users that are interested in charlesreid1-awesome are comparing it to the libraries listed below
- CLI tools using Harpoon features☆21Updated last year
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆13Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Useful commands for infosec☆29Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Tips to protect your personal and company data☆28Updated 4 years ago
- CISOfy Handbook☆31Updated 8 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- A curated list of "damn vulnerable apps" and exploitable VMs / wargames. See contributing.md for information.☆32Updated 5 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆41Updated 5 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆21Updated 5 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆25Updated 2 years ago
- A static website template for security pages.☆50Updated 8 months ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- Learn the basics of cryptography throughout history.☆19Updated 4 years ago
- Research, whitepapers, and conference talks.☆15Updated 7 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 9 years ago
- A few transforms and a machine for parsing Nmap XML results☆37Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆83Updated 9 years ago
- ☆16Updated 6 years ago