crypto-cypher / privacy-for-identities
I wrote a book about privacy and OPSEC, so here it is.
☆67Updated 5 years ago
Alternatives and similar repositories for privacy-for-identities:
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
- Red Team Resources☆59Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 2 months ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Discover target social media profiles☆81Updated 2 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Use Tor for anonymous scanning with nmap☆80Updated 9 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- scythe: account enumerator☆61Updated 11 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- Containerized version of my fork of Nahamsec's Lazyrecon.☆49Updated last year
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- For all your network pentesting needs☆152Updated 8 months ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆143Updated 2 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago