h313 / dead-mans-switch
A dead man's switch which will send out a prerecorded message via email or SMS to predetermined people
☆27Updated 3 years ago
Alternatives and similar repositories for dead-mans-switch:
Users that are interested in dead-mans-switch are comparing it to the libraries listed below
- A simple very little blockchain, just for learning.☆27Updated 5 years ago
- Machine learning face recognition combined with a drone and osint tools☆46Updated 4 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆106Updated 2 years ago
- Create Containerized Clearnet Proxies☆30Updated 6 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated 2 weeks ago
- 🌠 The World's Fastest StegCracker 🌠☆28Updated 4 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Dead simple brute force tool for website login forms☆89Updated 11 months ago
- Official python agent for using the distributed hashcracker Hashtopolis☆71Updated last month
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- Automatically load stolen cookies from ChromePass☆24Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆58Updated 7 years ago
- Formatted HOSTS blocklist for 1.5K domains researched by Amnesty International; combats malicious mobile phone spyware☆39Updated 3 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆79Updated 2 years ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆38Updated 4 years ago
- A Phishing WIFI Rogue Captive Portal!☆42Updated 6 years ago
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆77Updated 3 years ago
- Social Framework☆29Updated 3 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆20Updated 6 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆86Updated last year
- ☆8Updated 5 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆29Updated 4 years ago
- (Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing…☆51Updated last year
- Setup a Tor over VPN or proxy/ VPS or Docker☆36Updated 3 years ago
- Download all Snap Map content from a specific location.☆100Updated 9 months ago
- The tor-relay.co configurator☆52Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 2 years ago