crypto-cypher / privacy-for-identitiesLinks
I wrote a book about privacy and OPSEC, so here it is.
☆67Updated 6 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 6 years ago
- Discover target social media profiles☆81Updated 2 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 8 months ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆176Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- scythe: account enumerator☆61Updated 12 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- Wi-Fi Covert Channel Chat demo application☆71Updated 7 years ago
- ☆81Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- cve-2018-10933 libssh authentication bypass☆108Updated 6 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- penetration testing scripts☆136Updated 5 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago