kristovatlas / how-to-securityLinks
Advice on how to do computer things securely for non-experts
☆58Updated 4 years ago
Alternatives and similar repositories for how-to-security
Users that are interested in how-to-security are comparing it to the libraries listed below
Sorting:
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- ☆198Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Configure Your Macbook For Blackhat☆177Updated 7 years ago
- ☆31Updated 5 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- A list of important security checks for GitHub individual and organization accounts☆15Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 4 months ago
- Phishing e-mail repository☆36Updated 5 years ago
- Network white noise collector☆19Updated 9 years ago
- How to set Tor to run as background process on every OSX login☆39Updated 7 years ago
- Backup scripts I use on my drives.☆25Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- ☆63Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Open Source INTelligence☆24Updated 5 years ago
- ☆56Updated 9 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Automated OpenSSH hardening☆42Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Python static blog generator☆42Updated 9 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- Docker container to run PoisonTap☆15Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago