☆1,940Jul 17, 2021Updated 4 years ago
Alternatives and similar repositories for anonymouth
Users that are interested in anonymouth are comparing it to the libraries listed below
Sorting:
- JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework☆188Jun 16, 2016Updated 9 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,606Apr 18, 2024Updated last year
- Anonymous peer-to-peer instant messaging☆3,917Dec 30, 2021Updated 4 years ago
- ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network☆18,746Jan 31, 2024Updated 2 years ago
- get things from one computer to another, safely☆22,432Updated this week
- Tweets metadata scraper & activity analyzer☆2,976Nov 14, 2023Updated 2 years ago
- Personal Onion Router To Assure Liberty☆833Jan 9, 2019Updated 7 years ago
- Set up a personal VPN in the cloud☆30,330Updated this week
- Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor brid…☆23,687May 4, 2021Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,237Nov 20, 2025Updated 4 months ago
- This repository is essentially for compiling information about Cypherpunks, the history of the movement, and the people/events of note.☆480May 31, 2018Updated 7 years ago
- The x86 processor fuzzer☆5,011Feb 20, 2024Updated 2 years ago
- An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.☆5,371Dec 10, 2025Updated 3 months ago
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,915May 28, 2024Updated last year
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,572Mar 1, 2024Updated 2 years ago
- A demo of overriding what's in a person's clipboard☆1,435Jan 2, 2024Updated 2 years ago
- A distributed, serverless, peer-to-peer chat application on IPFS☆1,638May 7, 2021Updated 4 years ago
- Peer-to-peer hypermedia protocol☆23,044May 1, 2025Updated 10 months ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,321Jul 27, 2021Updated 4 years ago
- The versioned, forkable, syncable database☆7,431Aug 27, 2021Updated 4 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,995Mar 11, 2026Updated last week
- A handy guide to financial support for open source☆7,550Aug 6, 2025Updated 7 months ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,234Oct 4, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Open Machine Intelligence Framework for Hackers. (GPU/CPU)☆5,552Mar 20, 2024Updated 2 years ago
- The magma server daemon, is an encrypted email system with support for SMTP, POP, IMAP, HTTP and MOLTEN,. Additional support for DMTP and…☆1,837Mar 6, 2025Updated last year
- 🔑🔥📈 Next Level PGP☆3,468Mar 27, 2019Updated 6 years ago
- A decentralization of GitHub using BitTorrent and Bitcoin☆4,773Jul 29, 2020Updated 5 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,100Jul 3, 2022Updated 3 years ago
- Google Chromium, sans integration with Google☆26,034Mar 14, 2026Updated last week
- The Berkeley Document Summarizer is a learning-based, single-document summarization system that extracts source document content, exploit…☆746Feb 25, 2019Updated 7 years ago
- Based on a true story☆49,439Oct 23, 2023Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,450Nov 26, 2018Updated 7 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,293Jul 10, 2024Updated last year
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆761Jun 22, 2020Updated 5 years ago
- Zcash - Internet Money☆5,375Feb 20, 2026Updated last month
- The single instruction C compiler☆10,157May 29, 2024Updated last year
- Transmits AM radio on computers without radio transmitting hardware.☆6,662Sep 25, 2024Updated last year
- Private messaging system that hides metadata☆2,486Sep 12, 2019Updated 6 years ago