danielcuthbert / thescumLinks
This is an attempt to footprint all the trackers and profiling attempts used by numerous UK newspapers operating online, papers known for being liberal with the truth. It is a work in progress and the trackers listed here can also apply to other aspects of the web we use today.
☆68Updated 5 years ago
Alternatives and similar repositories for thescum
Users that are interested in thescum are comparing it to the libraries listed below
Sorting:
- A collection of online trackers, advertising networks, telemetry collectors and general 'we like to watch' lists for you to use to get be…☆113Updated 4 years ago
- first commit☆20Updated 2 months ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- Universal Honey Pot☆29Updated 2 months ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- A Passive SSH back-end and scanner.☆104Updated 5 months ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 5 months ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 7 years ago
- Extract deleted secrets from git repos☆61Updated 7 years ago
- GCP and GSUITE security auditing scripts☆27Updated last year
- Testing/collecting some container breakouts☆94Updated 6 years ago
- This is a list of Computer and Network Security Axioms☆30Updated 5 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- LittleSnitch Log Statistics Exporter☆35Updated 2 years ago
- Probing a network for Ubiquiti devices and parsing responses☆19Updated 9 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆113Updated 5 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- ☆60Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- Files vetted, and approved for public release☆55Updated last year
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Tools for AWS forensics☆64Updated 9 years ago
- Continuous Integration and Development ExploiteR☆87Updated 2 years ago