mikeguidry / antisurveillanceLinks
I agree with mass surveillance, but not government corruption. This is the result.
☆11Updated 5 years ago
Alternatives and similar repositories for antisurveillance
Users that are interested in antisurveillance are comparing it to the libraries listed below
Sorting:
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆45Updated 6 years ago
- Just a collection of scripts☆40Updated 5 years ago
- log file scrubber☆16Updated 7 years ago
- Wardriving ekoparty☆15Updated 8 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆78Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- MiTM tools and scripts☆19Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆41Updated 9 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- CTF Writeups☆17Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- ☆58Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago