h313 / dead-mans-switchLinks
A dead man's switch which will send out a prerecorded message via email or SMS to predetermined people
☆27Updated 3 years ago
Alternatives and similar repositories for dead-mans-switch
Users that are interested in dead-mans-switch are comparing it to the libraries listed below
Sorting:
- tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.☆229Updated last year
- EndGame DDoS filter.☆260Updated 3 years ago
- Machine learning face recognition combined with a drone and osint tools☆46Updated 5 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆81Updated 2 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆111Updated 9 months ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆78Updated 2 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆89Updated last year
- A tiny Tor client implementation (in pure python).☆133Updated last year
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆292Updated this week
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 11 months ago
- Tampermonkey script that encrypt and decrypt your messages on Discord☆90Updated 5 years ago
- Automatically load stolen cookies from ChromePass☆24Updated 4 years ago
- An open-source, centralized HTTPS botnet☆74Updated 2 years ago
- This program provides efficient web scraping services for Tor and non-Tor sites. The program has both a CLI and REST API.☆166Updated 3 months ago
- Social Framework☆29Updated 4 years ago
- Torrent files for data breaches used in research☆136Updated 3 years ago
- Setup a Tor over VPN or proxy/ VPS or Docker☆36Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆114Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Lightshot scraper on steroids with OCR.☆261Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆65Updated 6 years ago
- Simple WPA-PSK default password candidates generator for mobile broadband WIFI routers, based on IMEI☆42Updated last week
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Automated rogue access point setup tool.☆197Updated 4 years ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆33Updated last year
- TorGhost redirects all your internet traffic through SOCKS5 Tor proxy.☆66Updated last year
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Web Base Telnyx/Twilio VoIP Interface enabling SMS, MMS and Voice calls using the providers API Keys and self-hosting the application.☆269Updated last year
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆303Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Updated 6 years ago