Lists (13)
Sort Name ascending (A-Z)
Starred repositories
Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced resurrection of ProxyHam)
Robust Speech Recognition via Large-Scale Weak Supervision
Simple FREE guide to set up TOR stealth and persistence with complete anonymity.
Privacy browser extension for opting out from web tracking via GPC
Deep links to opt-out of data sharing by 100+ companies.
ET is a powerful application to improve performance, debloat, optimize and enhance privacy for Windows 10/11.
Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the background to empower you in identifying what data points (…
Wor is a Powershell script to harden, debloat, optimize, enhance privacy, avoid fingerprinting and improve performance on Windows 10 and 11.
Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions
Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked mobile device
Totem allows you to retrieve information about ads of a facebook page , we can retrieve the number of people targeted, how much the ad cost and a lot of other information.
FinSpy for Android technical analysis and tools
OSINT Tool gets a range of information from an Instagram account 🛠
Collector is a OSINT tool and information gathering. This tool can do information gathering phone numbers, github account, ip address and instagram account.
XRay is a tool for recon, mapping and OSINT gathering from public networks.
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
samyk / nodecopter-osc
Forked from markkleeb/nodecopter-oscReceiving OSC messages via the Autopilot class to fly the AR Parrot drone
samyk / natpinning
Forked from allodoxaphobia/natpinningNAT Pinning exploit tool for penetration testers.
USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoor, and rerouting DNS within seconds of plugging it in.
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from an…
A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless or flying distance, creating an army of zombie drones under y…
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
samyk / apple_bleee
Forked from hexway/apple_bleeeApple BLE research
Browser-based network scanner & local-IP detection