kristovatlas / how-to-security
Advice on how to do computer things securely for non-experts
☆61Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for how-to-security
- Checklist for securing communications☆37Updated 4 years ago
- A Security and Privacy Guide for non-technical users☆44Updated 9 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆46Updated 8 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆27Updated last year
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆94Updated 5 years ago
- A list of important security checks for GitHub individual and organization accounts☆15Updated 6 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- ☆31Updated 4 years ago
- ☆198Updated 8 years ago
- TOR Mail encrypted server for Hidden Services☆39Updated 8 years ago
- ☆62Updated 8 years ago
- How to set Tor to run as background process on every OSX login☆38Updated 6 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆32Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 7 years ago
- Twintelligence is a free Twitter OSINT tool☆51Updated 3 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 3 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 5 years ago
- password cracking front end☆58Updated 4 years ago
- initial upload☆19Updated 9 years ago
- Open Source INTelligence☆26Updated 4 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 5 years ago
- Maltego with a twist of wireless☆25Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- List of penetration testing tools.☆23Updated 4 years ago