Pinned Repositories
Quicker
Quick attack on a specific phishing website
DForce
Force down phishing websites
jonis100
Config files for my GitHub profile.
LiLimit
Chrome extension for limit visits and time per visit on individual websites list
nampy
Optional poisoned numpy - The fundamental package for scientific computing with Python
opal
Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
OpenUni
r1xbot
Robot 1X bot for Telegram and WhatsApp
SpyGuard
SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network flows transmitted by a device.
TinyCheck
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order t
jonis100's Repositories
jonis100/OpenUni
jonis100/jonis100
Config files for my GitHub profile.
jonis100/opal
Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
jonis100/LiLimit
Chrome extension for limit visits and time per visit on individual websites list
jonis100/TinyCheck
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order t
jonis100/DForce
Force down phishing websites
jonis100/nampy
Optional poisoned numpy - The fundamental package for scientific computing with Python
jonis100/r1xbot
Robot 1X bot for Telegram and WhatsApp
jonis100/SpyGuard
SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network flows transmitted by a device.
jonis100/Quicker
Quick attack on a specific phishing website