kristovatlas / how-to-security
Advice on how to do computer things securely for non-experts
☆61Updated 4 years ago
Alternatives and similar repositories for how-to-security:
Users that are interested in how-to-security are comparing it to the libraries listed below
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- Checklist for securing communications☆37Updated 4 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆32Updated 9 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- How to set Tor to run as background process on every OSX login☆38Updated 6 years ago
- A Security and Privacy Guide for non-technical users☆44Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 8 years ago
- A list of important security checks for GitHub individual and organization accounts☆15Updated 7 years ago
- List of penetration testing tools.☆23Updated 4 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆66Updated 5 years ago
- Password manager for USB Armory☆37Updated 9 years ago
- Easy creation of Tor Hidden Services☆39Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 5 years ago
- Network white noise collector☆18Updated 8 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- ☆198Updated 8 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆27Updated 2 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Phishing Toolkit☆19Updated 6 years ago
- ☆39Updated 6 years ago
- initial upload☆19Updated 9 years ago