☆1,937Jul 17, 2021Updated 4 years ago
Alternatives and similar repositories for anonymouth
Users that are interested in anonymouth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JStylo-Anonymouth - Authorship Attribution and Authorship Anonymization Framework☆191Jun 16, 2016Updated 9 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,635Apr 18, 2024Updated 2 years ago
- Anonymous peer-to-peer instant messaging☆3,915Dec 30, 2021Updated 4 years ago
- ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network☆18,750Jan 31, 2024Updated 2 years ago
- get things from one computer to another, safely☆22,624Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tweets metadata scraper & activity analyzer☆2,983Nov 14, 2023Updated 2 years ago
- Personal Onion Router To Assure Liberty☆833Jan 9, 2019Updated 7 years ago
- Community guide to securing and improving privacy on macOS.☆22,395Jan 2, 2026Updated 4 months ago
- Set up a personal VPN in the cloud☆30,235Updated this week
- Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor brid…☆23,476May 4, 2021Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,284Nov 20, 2025Updated 6 months ago
- This repository is essentially for compiling information about Cypherpunks, the history of the movement, and the people/events of note.☆480May 31, 2018Updated 7 years ago
- The x86 processor fuzzer☆5,023Feb 20, 2024Updated 2 years ago
- An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.☆5,387Mar 20, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,943May 28, 2024Updated last year
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,588Mar 1, 2024Updated 2 years ago
- Peer-to-peer hypermedia protocol☆23,050May 1, 2025Updated last year
- A demo of overriding what's in a person's clipboard☆1,436Jan 2, 2024Updated 2 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,328Jul 27, 2021Updated 4 years ago
- A distributed, serverless, peer-to-peer chat application on IPFS☆1,634May 7, 2021Updated 5 years ago
- The versioned, forkable, syncable database☆7,425Aug 27, 2021Updated 4 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,666Apr 17, 2026Updated last month
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,262Oct 4, 2023Updated 2 years ago
- A handy guide to financial support for open source☆7,665Aug 6, 2025Updated 9 months ago
- Open Machine Intelligence Framework for Hackers. (GPU/CPU)☆5,543Mar 20, 2024Updated 2 years ago
- The magma server daemon, is an encrypted email system with support for SMTP, POP, IMAP, HTTP and MOLTEN,. Additional support for DMTP and…☆1,838Mar 6, 2025Updated last year
- 🔑🔥📈 Next Level PGP☆3,466Mar 27, 2019Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,123Jul 3, 2022Updated 3 years ago
- Google Chromium, sans integration with Google☆26,630May 13, 2026Updated last week
- A decentralization of GitHub using BitTorrent and Bitcoin☆4,762Jul 29, 2020Updated 5 years ago
- The Berkeley Document Summarizer is a learning-based, single-document summarization system that extracts source document content, exploit…☆746Feb 25, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Based on a true story☆49,500Oct 23, 2023Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,465Nov 26, 2018Updated 7 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,309Jul 10, 2024Updated last year
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆760Jun 22, 2020Updated 5 years ago
- Zcash - Internet Money☆5,415May 11, 2026Updated last week
- The single instruction C compiler☆10,181May 29, 2024Updated last year
- Transmits AM radio on computers without radio transmitting hardware.☆6,677Mar 18, 2026Updated 2 months ago