kristovatlas / how-to-securityLinks
Advice on how to do computer things securely for non-experts
☆59Updated 4 years ago
Alternatives and similar repositories for how-to-security
Users that are interested in how-to-security are comparing it to the libraries listed below
Sorting:
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Easy creation of Tor Hidden Services☆40Updated 10 years ago
- ☆198Updated 9 years ago
- You'll never take me alive.☆86Updated 11 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Overview Tooling Process Physical People☆46Updated 4 years ago
- Configure Your Macbook For Blackhat☆172Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- Network white noise collector☆19Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆66Updated 5 years ago
- How to set Tor to run as background process on every OSX login☆39Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 8 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- documentation and writing☆41Updated 7 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- A Security and Privacy Guide for non-technical users☆44Updated 9 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆36Updated 10 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Updated 9 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- initial upload☆19Updated 10 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆46Updated 8 years ago
- Find wifi channel with least interference☆54Updated 5 years ago