danielcuthbert / trackersLinks
A collection of online trackers, advertising networks, telemetry collectors and general 'we like to watch' lists for you to use to get better control on what they know and can see.
☆112Updated 3 years ago
Alternatives and similar repositories for trackers
Users that are interested in trackers are comparing it to the libraries listed below
Sorting:
- This is an attempt to footprint all the trackers and profiling attempts used by numerous UK newspapers operating online, papers known for…☆68Updated 4 years ago
- A Passive SSH back-end and scanner.☆102Updated 3 months ago
- LittleSnitch Log Statistics Exporter☆33Updated 2 years ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆172Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- Python library used by CIRCLean (the USB sanitizer) and others☆55Updated last year
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆98Updated 4 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆67Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Files vetted, and approved for public release☆53Updated last year
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- OS image for the PiRogue based on Debian 12☆157Updated 10 months ago
- Defensomania is a security monitoring and incident response card game.☆62Updated 2 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Pivoting Frontend for Pre-Seeded Password Databases☆129Updated 2 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Packet communication investigator☆92Updated 2 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆281Updated last year
- ☆118Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- CSIRT Jump Bag☆26Updated last year
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 4 years ago