crypto-cypher / privacy-for-identitiesLinks
I wrote a book about privacy and OPSEC, so here it is.
☆66Updated 6 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 6 years ago
- Discover target social media profiles☆81Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 3 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated last year
- Extensible Red Team Framework☆112Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- ☆68Updated 4 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆177Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Rogue AP killer☆92Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- Rogue Access Point Detector☆36Updated last year
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- ☆53Updated last year
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- penetration testing scripts☆136Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago