h313 / dead-mans-switchLinks
A dead man's switch which will send out a prerecorded message via email or SMS to predetermined people
☆26Updated 4 years ago
Alternatives and similar repositories for dead-mans-switch
Users that are interested in dead-mans-switch are comparing it to the libraries listed below
Sorting:
- Machine learning face recognition combined with a drone and osint tools☆44Updated 5 years ago
- tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.☆231Updated 3 months ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆79Updated 3 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆246Updated last year
- Python 3 ChatBot / Botnet☆35Updated 6 months ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆90Updated 3 months ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- Find interesting internet-exposed cameras through the Shodan API☆16Updated 4 years ago
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆304Updated last week
- This program provides efficient web scraping services for Tor and non-Tor sites. The program has both a CLI and REST API.☆168Updated 2 weeks ago
- Dead simple brute force tool for website login forms☆93Updated last year
- TorGhost redirects all your internet traffic through SOCKS5 Tor proxy.☆65Updated last year
- Python framework to scrape Pastebin pastes and analyze them☆127Updated 7 months ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆125Updated 3 years ago
- EndGame DDoS filter.☆266Updated 3 years ago
- (Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing…☆54Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆118Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- A simple very little blockchain, just for learning.☆26Updated 5 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- A set of scripts to list tor hidden services☆177Updated last week
- Full Valid Fake Data Generator☆101Updated last year
- Search .git folders for emails and URL's that should otherwise be hidden☆34Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆114Updated last year
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆120Updated 4 years ago
- An Audio Steganography Tool, written in C++☆67Updated 4 years ago
- Command line interface to interact with hashes.com escrow service.☆38Updated 3 months ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆37Updated 4 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated 2 years ago