☆1,939Jul 17, 2021Updated 4 years ago
Alternatives and similar repositories for anonymouth
Users that are interested in anonymouth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework☆190Jun 16, 2016Updated 9 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,628Apr 18, 2024Updated 2 years ago
- Anonymous peer-to-peer instant messaging☆3,913Dec 30, 2021Updated 4 years ago
- ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network☆18,747Jan 31, 2024Updated 2 years ago
- Tweets metadata scraper & activity analyzer☆2,980Nov 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- get things from one computer to another, safely☆22,573Apr 13, 2026Updated 2 weeks ago
- Personal Onion Router To Assure Liberty☆833Jan 9, 2019Updated 7 years ago
- Community guide to securing and improving privacy on macOS.☆22,396Jan 2, 2026Updated 3 months ago
- Set up a personal VPN in the cloud☆30,231Updated this week
- Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor brid…☆23,511May 4, 2021Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,276Nov 20, 2025Updated 5 months ago
- This repository is essentially for compiling information about Cypherpunks, the history of the movement, and the people/events of note.☆480May 31, 2018Updated 7 years ago
- The x86 processor fuzzer☆5,018Feb 20, 2024Updated 2 years ago
- An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.☆5,387Mar 20, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,931May 28, 2024Updated last year
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,583Mar 1, 2024Updated 2 years ago
- Peer-to-peer hypermedia protocol☆23,044May 1, 2025Updated last year
- A demo of overriding what's in a person's clipboard☆1,436Jan 2, 2024Updated 2 years ago
- Anti-stylometry tool based on PSAL's Anonymouth☆11Oct 30, 2019Updated 6 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,323Jul 27, 2021Updated 4 years ago
- A distributed, serverless, peer-to-peer chat application on IPFS☆1,635May 7, 2021Updated 4 years ago
- The versioned, forkable, syncable database☆7,429Aug 27, 2021Updated 4 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,548Apr 17, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,249Oct 4, 2023Updated 2 years ago
- A handy guide to financial support for open source☆7,652Aug 6, 2025Updated 8 months ago
- Open Machine Intelligence Framework for Hackers. (GPU/CPU)☆5,545Mar 20, 2024Updated 2 years ago
- The magma server daemon, is an encrypted email system with support for SMTP, POP, IMAP, HTTP and MOLTEN,. Additional support for DMTP and…☆1,839Mar 6, 2025Updated last year
- 🔑🔥📈 Next Level PGP☆3,467Mar 27, 2019Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,119Jul 3, 2022Updated 3 years ago
- Google Chromium, sans integration with Google☆26,379Updated this week
- A decentralization of GitHub using BitTorrent and Bitcoin☆4,767Jul 29, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The Berkeley Document Summarizer is a learning-based, single-document summarization system that extracts source document content, exploit…☆746Feb 25, 2019Updated 7 years ago
- Based on a true story☆49,467Oct 23, 2023Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,458Nov 26, 2018Updated 7 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,302Jul 10, 2024Updated last year
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆761Jun 22, 2020Updated 5 years ago
- Zcash - Internet Money☆5,399Apr 23, 2026Updated last week
- The single instruction C compiler☆10,172May 29, 2024Updated last year