Lists (1)
Sort Name ascending (A-Z)
Starred repositories
An opinionated list of awesome Python frameworks, libraries, software and resources.
A feature-rich command-line audio/video downloader
Hunt down social media accounts by username across social networks
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
🕵️♂️ Collect a dossier on a person by username from thousands of sites
Backup and keep your application settings in sync.
Style transfer, deep learning, feature transform
An open-source post-exploitation framework for students, researchers and developers.
Automated All-in-One OS Command Injection Exploitation Tool.
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Reference client for Bitmessage: a P2P encrypted decentralised communication protocol:
This is a list of substantial, commercial-or-social-good mainstream websites which provide onion services.
A post-exploitation OS X/Linux agent written in Python 2.7
Zentral is a high-visibility platform for controlling Apple endpoints in enterprises. It brings great observability to IT and makes tracking & reporting compliance much less manual.
ISP Data Pollution to Protect Private Browsing History with Obfuscation
A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or al…
a set of tools to help with securely redacting and stripping metadata from documents before publishing
Quicktime atom positioning in Python for fast streaming
Collection of forensics artifacts location for Mac OS X and iOS
SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encrypti…
A command-line Kinescope video downloader
Testing the effectiveness of practical implementations of adversarial examples against facial recognition.