crypto-cypher / privacy-for-identitiesLinks
I wrote a book about privacy and OPSEC, so here it is.
☆67Updated 6 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 6 years ago
- Discover target social media profiles☆81Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆54Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- ☆68Updated 4 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 10 months ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Operational Security utility and automator.☆139Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆125Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 6 years ago
- Collect information about email addresses from Pastebin☆38Updated 4 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆177Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Extensible Red Team Framework☆112Updated 5 years ago
- penetration testing scripts☆136Updated 6 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- Linux setup tool for Kali Linux☆79Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- ☆23Updated 5 years ago
- Containerized version of my fork of Nahamsec's Lazyrecon.☆50Updated 3 months ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago