ddosecrets / torrent-mirroring
A guide to downloading all public DDoSecrets releases via torrent
☆23Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for torrent-mirroring
- Binary and Static Releases☆13Updated 6 months ago
- ☆33Updated 4 months ago
- A comprehensive guide to using AI technologies safely while protecting your privacy. Covers self-hosted solutions, popular AI services, b…☆28Updated 3 weeks ago
- trustor (PoC)☆25Updated 2 years ago
- Documentation for the SecureDrop project☆22Updated this week
- ☆14Updated last year
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆46Updated last year
- A tool for searching common variations of a human name☆42Updated last month
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆26Updated 4 months ago
- A collection of handy Google Apps Script code snippets☆24Updated last year
- Analysis for "Geofenced Searches on Twitter: A Case Study Detailing South Asia’s Covid Crisis", published on May 19, 2021.☆24Updated last year
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆29Updated 5 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆63Updated 3 weeks ago
- Daily updates from leaked data search engines and aggregators☆85Updated this week
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆30Updated 3 weeks ago
- A Python tool to estimate the distance of an explosion in a video based on the sound delay between the flash and boom of the explosion☆34Updated last year
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆32Updated 9 years ago
- Notes and receipts (PCAPs) for TCP and ICMP Noise Storms☆50Updated last month
- Open YARA scan- and search engine☆16Updated this week
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆13Updated 3 years ago
- ☆77Updated last year
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- Detection Rule License (DRL)☆14Updated last year
- Easy to deploy API for transcribing and translating audio / video using OpenAI's whisper model.☆63Updated 6 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Code that goes along with the Hacks, Leaks, and Revelations book☆130Updated 5 months ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆43Updated 2 weeks ago
- ☆92Updated 7 months ago