crypto-cypher / privacy-for-identities
I wrote a book about privacy and OPSEC, so here it is.
☆67Updated 5 years ago
Alternatives and similar repositories for privacy-for-identities:
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
- Red Team Resources☆59Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- scythe: account enumerator☆61Updated 11 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- unix wildcard attacks☆132Updated 6 years ago
- A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.☆58Updated this week
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- The Cloud Blocker☆94Updated last month
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Discover target social media profiles☆81Updated 2 years ago
- Operational Security utility and automator.☆135Updated 4 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 4 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆143Updated 2 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 4 months ago
- Pypykatz server☆125Updated 6 years ago
- Responsive Command and Control System☆103Updated 2 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Updated 4 years ago
- ☆68Updated 3 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago