kristovatlas / how-to-securityLinks
Advice on how to do computer things securely for non-experts
☆59Updated 4 years ago
Alternatives and similar repositories for how-to-security
Users that are interested in how-to-security are comparing it to the libraries listed below
Sorting:
- Configure Your Macbook For Blackhat☆172Updated 7 years ago
- ☆199Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- ☆55Updated 9 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Some good software for those concerned about their OPSEC. Geared towards journalists, but good fo…☆95Updated 6 years ago
- Easy creation of Tor Hidden Services☆40Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆335Updated 7 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- A Security and Privacy Guide for non-technical users☆44Updated 9 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆47Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated last week
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- How to set Tor to run as background process on every OSX login☆39Updated 7 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Explore the Tor network☆88Updated 2 years ago
- ☆63Updated 9 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 9 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆99Updated 6 years ago
- Hacker OPSEC☆96Updated 7 years ago