crypto-cypher / privacy-for-identitiesLinks
I wrote a book about privacy and OPSEC, so here it is.
☆67Updated 5 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 6 years ago
- Discover target social media profiles☆81Updated 2 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆178Updated 5 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Tool to help identify timing attacks☆70Updated 13 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- ☆68Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago