trape
i2pd
trape | i2pd | |
---|---|---|
12 | 54 | |
7,919 | 3,097 | |
- | 1.1% | |
0.0 | 9.6 | |
2 months ago | 1 day ago | |
Python | C++ | |
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
trape
-
TRACK PEOPLE ON THE INTERNET: Learn to track your opps world, to avoid being traced
Github Link
- ILPT Request: how do I track a phone...
- ILPT Request: How to bypass phishing detection? Google detects my phishing link that I send to shit faces that like to spread rumors and damage reputation. Google detects every link sent to an android phone.
- Some information and advice about DDoS, from someone who was there during #opPayback
- trape - Tool to track and execute intelligent social engineering attacks in real time.
- Tool to track and execute intelligent social engineering attacks in real time
- Using Pi4 running Bettercap as a honeypot to catch a legit stalker
-
Can you backtrace a VPN covered IP to reach its origin? If so, which is the process (from a high-level)
Well I would highly recommend using this Trape OSINT tool for tracking people on internet (Github)
- Android RAT
- What are some other cool tools for beginners like me ?
i2pd
-
I want to help the network, but need assistance
I'm running a tor bridge on my home proxmox box, and I'm interested in running an i2p node as well but I have no experience with this. From what I was able to gather the easiest way is to install the i2pd .deb (https://github.com/PurpleI2P/i2pd/releases).
-
[task] link me up with i2pd (c++) developers for a small fee
need someone to find me c++ developers who are very familiar with the i2pd codebase and link me up with them for the price of $25 USD (I can do payments in crypto or cashapp).
- I2P: End-to-End encrypted and anonymous Internet
-
Tor’s history of D/DoS attacks and future strategies for mitigation
If you really dislike Java that much, there are other I2P implementations like this:
https://github.com/PurpleI2P/i2pd
-
ansible role for i2pd
I created an ansible role for i2pd. Basically, this allows system administrators who want to take part in the I2P network to automate i2pd deployment.
- I2P adoption in qBittorrent has begun
-
Freenet 2023: a drop-in decentralized replacement for the web - and more
Check this: https://i2pd.website/
-
i2pd
there may be instructions in the github i think? https://github.com/PurpleI2P/i2pd
-
Cloudflare Disables Access to ‘Pirated’ Content on Its IPFS Gateway
> We are building network which helps people to communicate and share information without restrictions.
> Free from censorship. Free from privacy violations.
https://i2pd.website/
I2P is neither “for” nor “not for” piracy. I2P is for protecting communications and data from any kind of censorship.
Filtering copyright violating content is a type of censorship. To some it is justified. To others it is not.
To a network protocol like I2P the point is that no kind of censorship should be possible. Regardless of reason.
What are some alternatives?
Android-RATList - Android - Remote Access Trojan List
i2p.i2p - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
email2phonenumber - A OSINT tool to obtain a target's phone number just by having his email address
i2p-zero - Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface
dirsearch - Web path scanner
i2pplus - I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer - this is a mirror of https://gitlab.com/i2pplus/I2P.Plus/
osmedeus - A Workflow Engine for Offensive Security
InviZible - Android application for online privacy and security
GRecon - Another version of katana, more automated but less stable. the purpose of this small tool is to run a Google based passive recon against your scope.
Freenet - Freenet REference Daemon
longtongue - Customized Password/Passphrase List inputting Target Info
i2pdbrowser - i2pd browser bundle