h313 / dead-mans-switchLinks
A dead man's switch which will send out a prerecorded message via email or SMS to predetermined people
☆26Updated 4 years ago
Alternatives and similar repositories for dead-mans-switch
Users that are interested in dead-mans-switch are comparing it to the libraries listed below
Sorting:
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆78Updated 2 years ago
- TorGhost redirects all your internet traffic through SOCKS5 Tor proxy.☆66Updated last year
- My blog about Cybersecurity, Privacy and Systems :)☆41Updated 6 months ago
- EndGame DDoS filter.☆266Updated 3 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆79Updated 3 years ago
- (Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing…☆53Updated last year
- tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.☆231Updated 4 months ago
- Machine learning face recognition combined with a drone and osint tools☆44Updated 5 years ago
- Kraken: A multi-platform distributed brute-force password cracking system☆325Updated 2 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆121Updated last year
- A hashcat-based distributed password cracking system☆166Updated 6 months ago
- Dead simple brute force tool for website login forms☆93Updated last year
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆209Updated last year
- A set of scripts to list tor hidden services☆181Updated 2 months ago
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆309Updated this week
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- A lightweight ducky script generator written in python.☆36Updated 4 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated 2 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆89Updated 4 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆117Updated 4 years ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆36Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- Automated hacking tool used to find leaked databases with 97.1% accuracy to grab emails along with their password from recent Pastebin up…☆37Updated 2 years ago
- Find interesting internet-exposed cameras through the Shodan API☆16Updated 4 years ago
- Command line interface to interact with hashes.com escrow service.☆41Updated last week
- A simple very little blockchain, just for learning.☆26Updated 6 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Updated last year
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆136Updated 2 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆309Updated 5 years ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆37Updated 4 years ago