crypto-cypher / privacy-for-identitiesLinks
I wrote a book about privacy and OPSEC, so here it is.
☆66Updated 6 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 7 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Discover target social media profiles☆81Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- penetration testing scripts☆136Updated 6 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆96Updated last year
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- ☆52Updated last year
- Extensible Red Team Framework☆112Updated 6 years ago
- ☆81Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Updated 9 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- ☆25Updated 2 years ago
- Collect information about email addresses from Pastebin☆38Updated 4 years ago