jjjxu / NSO_Pegasus_BlocklistLinks
Formatted HOSTS blocklist for 1.5K domains researched by Amnesty International; combats malicious mobile phone spyware
☆41Updated 4 years ago
Alternatives and similar repositories for NSO_Pegasus_Blocklist
Users that are interested in NSO_Pegasus_Blocklist are comparing it to the libraries listed below
Sorting:
- This is the github repository for all NSA and CIA spying servers, including those revealed by Edward Snowden and other studies we conduct…☆122Updated last year
- List of NSO Pegasus's C2C Servers where will be used to control Pegasus.☆18Updated 2 years ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆175Updated last year
- My blog about Cybersecurity, Privacy and Systems :)☆41Updated 2 months ago
- Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. …☆41Updated 6 months ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 5 years ago
- A repository of Tor hidden services.☆65Updated 3 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Malware, advert and tracking blacklist☆119Updated last year
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆39Updated 3 years ago
- ☆70Updated 5 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Instructions for setting up DNS over TLS over TOR☆148Updated 5 years ago
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆18Updated this week
- TorGhost redirects all your internet traffic through SOCKS5 Tor proxy.☆65Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Various analysis of Android stalkerware☆112Updated 5 years ago
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆30Updated this week
- A curated list of amazingly awesome OSINT☆41Updated 6 years ago
- Machine-readable .txt blocklist of scam URLs and IP Addresses from the Global Anti Scam Organization (https://www.globalantiscam.org) web…☆37Updated this week
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆40Updated last year
- Postman collection to interact with the Shodan API☆25Updated last year
- Maltego integration of https://clearbit.com☆41Updated 4 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- OSINT license plate data by scraping lookup site(s)☆13Updated 2 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Packaging scripts and related configs for distributing Kismet☆44Updated 3 weeks ago