mindedsecurity / shhlack
Slack message encryptor/decryptor for desktop app and browser
☆170Updated 6 years ago
Alternatives and similar repositories for shhlack:
Users that are interested in shhlack are comparing it to the libraries listed below
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Cleans out "open" wireless connections from OSX machine☆152Updated 4 years ago
- Flashpaper is a simple go-based service for creating one time use links to text data or individual files.☆148Updated last year
- A simple JavaScript library to help you protect your users' passwords☆149Updated 2 years ago
- 🐦 Find tweets that contain expired or claimable URLs from your Twitter archive.☆43Updated 6 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated 9 months ago
- ☆133Updated 5 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆110Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 4 years ago
- A basic tool for pushing a web page to multiple archiving services at once.☆214Updated 8 months ago
- Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.☆139Updated 8 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 7 years ago
- A Shell Script To Take Care Of Ubuntu Basics☆142Updated 4 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 6 years ago
- My friend needed an amazon-dash button that did not exist, this is my modification to extend the dash button to any product.☆89Updated 9 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆103Updated 7 years ago
- Sunder is a user-friendly graphical interface for Shamir's Secret Sharing.☆160Updated 5 years ago
- Wristband research tools☆31Updated 8 years ago
- You call PwnBot in Slack on someone else's unlocked computer☆91Updated 2 years ago
- This repository contains a step-by-step guide and sample configs how to turn a Raspberry Pi Zero-W into a portable companion device. Buil…☆124Updated 7 years ago
- Harden your Chrome browser via enterprise policy.☆283Updated 2 years ago
- See if your passwords in pass has been breached.☆132Updated 6 years ago
- You'll Never Take Me Alive!☆234Updated 9 years ago
- Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the…☆307Updated 2 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆332Updated 7 years ago
- Blog-type notes about building Onion sites☆145Updated 7 years ago
- ☆56Updated 7 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆172Updated 6 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆579Updated 7 years ago
- AWS Lambda Infection Toolkit // Persistent Lambda Malware PoC☆159Updated 8 years ago