crypto-cypher / privacy-for-identitiesLinks
I wrote a book about privacy and OPSEC, so here it is.
☆66Updated 6 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 7 years ago
- Discover target social media profiles☆81Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Extensible Red Team Framework☆112Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆96Updated last year
- ☆68Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- scythe: account enumerator☆61Updated 12 years ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆176Updated 6 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- ☆52Updated last year
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year