charlesreid1 / charlesreid1-awesome
An awesome list for all the awesome stuff I do. 🕶️
☆28Updated last year
Alternatives and similar repositories for charlesreid1-awesome:
Users that are interested in charlesreid1-awesome are comparing it to the libraries listed below
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Learn the basics of cryptography throughout history.☆19Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- Mattermost - Shodan Slash command☆31Updated 7 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Useful commands for infosec☆29Updated last year
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆21Updated 5 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Updated 13 years ago
- A static website template for security pages.☆50Updated 4 months ago
- BlackArch Linux Slim ISO☆24Updated 6 years ago
- Qubes component: app-linux-pdf-converter☆54Updated 2 weeks ago
- Security Advisories and Researches☆16Updated 10 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- ☆24Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆40Updated 5 years ago
- Scan for subdomains using bruteforcing techniques☆40Updated 7 months ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- CLI tools using Harpoon features☆21Updated last year
- Research, whitepapers, and conference talks.☆15Updated 7 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆18Updated 6 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 9 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆11Updated 2 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago