cinience / GitStalker
Auto backup your github stars and repos
☆13Updated 9 years ago
Alternatives and similar repositories for GitStalker:
Users that are interested in GitStalker are comparing it to the libraries listed below
- Semantic SSH RSA keys☆25Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- A tool for securing communications between a client and a DNS resolver☆21Updated 9 years ago
- I2P bindings for Twisted.☆15Updated 2 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- bash script to download publicly available .svn directories☆16Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 4 years ago
- Universal guided editor and reverse engineering tool for binary data.☆11Updated 7 years ago
- HTTP host monitoring and management through DNS☆10Updated 3 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Updated 5 years ago
- Qubes OS architecture diagrams for use in articles, posts and docs☆15Updated 7 years ago
- An advanced memory forensics framework☆25Updated 10 years ago
- ☆30Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- TOR Mail encrypted server for Hidden Services☆40Updated 8 years ago
- ipv6 to onion service virtual public network adapter☆11Updated 9 years ago
- An embedded wireless security audit system☆21Updated 12 years ago
- ☆17Updated 9 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago