crypto-cypher / privacy-for-identities
I wrote a book about privacy and OPSEC, so here it is.
☆67Updated 5 years ago
Alternatives and similar repositories for privacy-for-identities:
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
- Red Team Resources☆59Updated 6 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 5 months ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 10 years ago
- Extract deleted secrets from git repos☆60Updated 7 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- ☆82Updated 5 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 3 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆178Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- ☆24Updated last year