cinience / GitStalker
Auto backup your github stars and repos
☆13Updated 10 years ago
Alternatives and similar repositories for GitStalker:
Users that are interested in GitStalker are comparing it to the libraries listed below
- Perl library for SHODAN☆17Updated 11 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Updated 5 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 4 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 11 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- An apt transport method enabling i2p using the SAM bridge.☆19Updated 5 years ago
- Hash-based password manager☆19Updated 6 years ago
- ipv6 to onion service virtual public network adapter☆11Updated 9 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- A free bookmarklet password generator.☆13Updated 10 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- Gateway between SMTP/POP3 and TOX protocol.☆13Updated 7 years ago
- An embedded wireless security audit system☆21Updated 12 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Updated 10 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- I2P bindings for Twisted.☆15Updated 2 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Implements uTP, the micro transport protocol as used with Bittorrent☆10Updated 8 years ago
- Syndie is an open source system for operating distributed forums, offering a secure and consistent interface to various anonymous and non…☆38Updated 3 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago