vadesecure / anonemail
Tool to remove personal information from body and headers of an email message (anonymization)
☆14Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for anonemail
- Test Suite for John the Ripper☆24Updated 2 years ago
- Python library for image hashing and deduplication☆11Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Library and tools to access the Extended File System☆16Updated 5 months ago
- The TCP Scanner☆24Updated 2 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 6 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- CSULB CECS 478 (Computer Security Project) A network firewall to block malicious traffic on a local network☆8Updated 5 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆15Updated 9 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- Semantic SSH RSA keys☆25Updated 10 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- A content inspecting SMTP proxy☆17Updated 10 years ago
- Encrypted end to end file transfer☆106Updated 6 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆8Updated 7 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 9 years ago
- Detect credit card exposures with Bro☆15Updated last year
- Hybrid Port Knocking System☆21Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Download exploits from exploit-db.com☆43Updated 9 years ago
- Start or attach to a process and monitor a customizable set of metrics (CPU, I/O, etc.)☆34Updated 7 years ago
- Simple Asynchronous HTTP Proxy written in python☆47Updated 10 years ago
- ☆10Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago