charlesreid1 / charlesreid1-awesomeLinks
An awesome list for all the awesome stuff I do. 🕶️
☆29Updated last year
Alternatives and similar repositories for charlesreid1-awesome
Users that are interested in charlesreid1-awesome are comparing it to the libraries listed below
Sorting:
- CLI tools using Harpoon features☆21Updated last year
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- A static website template for security pages.☆52Updated 9 months ago
- ☆17Updated 6 years ago
- Learn the basics of cryptography throughout history.☆19Updated 4 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆41Updated 5 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- The hacker technical cheat sheet☆39Updated last week
- Tips to protect your personal and company data☆28Updated 5 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆18Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- A graphical network monitor for Unix modeled after etherman.☆51Updated 10 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆21Updated 5 years ago
- CISOfy Handbook☆31Updated 8 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆21Updated 7 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆11Updated 8 years ago
- A curated list of "damn vulnerable apps" and exploitable VMs / wargames. See contributing.md for information.☆32Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Checklist for securing communications☆37Updated 5 years ago
- Scan for subdomains using bruteforcing techniques☆47Updated 11 months ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆30Updated 8 years ago
- Truehunter☆31Updated 4 years ago
- A curated threat modeling library collection☆22Updated last year