I wrote a book about privacy and OPSEC, so here it is.
☆66Aug 24, 2019Updated 6 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Collection of various materials on operational security.☆23Nov 15, 2016Updated 9 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- OPSEC related notes from various sources☆17Jun 22, 2015Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Python script that types out the text that exists in clipboard.☆12Mar 31, 2025Updated 11 months ago
- ESP8266 ROM Bootloader utility☆17Jul 17, 2017Updated 8 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- English subtitles for the TV series "Hackad"☆11May 18, 2023Updated 2 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- A Python command-line utility to convert enex-files to Markdown☆16Jul 9, 2023Updated 2 years ago
- Extract APFS hashes☆38Jun 16, 2020Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆94Mar 29, 2019Updated 6 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago
- BLST-Verification☆23Jan 22, 2026Updated last month
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- ☆25Jun 5, 2023Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.☆23Mar 19, 2017Updated 8 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago