crypto-cypher / privacy-for-identitiesView external linksLinks
I wrote a book about privacy and OPSEC, so here it is.
☆66Aug 24, 2019Updated 6 years ago
Alternatives and similar repositories for privacy-for-identities
Users that are interested in privacy-for-identities are comparing it to the libraries listed below
Sorting:
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Python script that types out the text that exists in clipboard.☆12Mar 31, 2025Updated 10 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ESP8266 ROM Bootloader utility☆17Jul 17, 2017Updated 8 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 2 months ago
- English subtitles for the TV series "Hackad"☆11May 18, 2023Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆13Jun 13, 2023Updated 2 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Dec 7, 2020Updated 5 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- IDA Pro плагин для отображения результат а Coresight ETM трассировки perf'а☆17Sep 4, 2018Updated 7 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Aug 30, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- A Python command-line utility to convert enex-files to Markdown☆16Jul 9, 2023Updated 2 years ago
- Extract APFS hashes☆38Jun 16, 2020Updated 5 years ago
- first commit☆20Sep 12, 2025Updated 5 months ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- huntr.dev public disclosures/hacktivity watcher☆16Nov 5, 2023Updated 2 years ago
- BLST-Verification☆23Jan 22, 2026Updated 3 weeks ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆297Oct 2, 2019Updated 6 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- ☆25Jun 5, 2023Updated 2 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago