BusKill / awesome-buskill-triggers
Antiforensic actions to secure your device if it's physically stolen from you
☆15Updated 2 years ago
Alternatives and similar repositories for awesome-buskill-triggers:
Users that are interested in awesome-buskill-triggers are comparing it to the libraries listed below
- BusKill kill cord for Linux☆36Updated 4 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆16Updated 4 years ago
- Overview of telecommunication standards and technologies for internet access☆14Updated 9 months ago
- Binary and Static Releases☆13Updated 9 months ago
- Design requirements for an open-source USB-A magnetic breakaway connector used in the BusKill laptop kill cord☆39Updated last week
- Builder Repository for Coreboot with Tianocore Firmware☆14Updated 6 months ago
- Schematic for an ultrasonic jammer that produces noise at 20kHz, around the range of the iPhone MEMS microphone. It's a way to non-invasi…☆17Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- QubesOS wiki and simple setup scripts for use by journalists and media organizations.☆20Updated 4 months ago
- Practices of resistance as well as abnormality, activism, civil disobedience, conspiracy, countercultural articulations, crypsis, delinqu…☆14Updated this week
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆29Updated 4 years ago
- OnionComms is a repository of script to run an onion server and guides to configure client side applications to connect to any onion serv…☆14Updated 3 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- A simple script demonstrating the power that comes with SSID sniffing☆16Updated 5 years ago
- Docker image for veilid☆9Updated 3 months ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆15Updated 3 years ago
- I2P analysis network.☆14Updated 9 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Updated 3 years ago
- The I2P Browser source code☆23Updated 2 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Updated 2 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- AICDL collector services and modules☆46Updated 7 years ago
- PANORAMIX repo☆20Updated 2 years ago
- A repository of CAD files for 3D printable optical components.☆19Updated 7 years ago
- Create Containerized Clearnet Proxies☆30Updated 5 years ago
- Remote neural monitoring, interconnected terrestrial and satellites radio networks. Church, state, military forces and nobles illegal con…☆23Updated last year
- RFID reader, writer, spoofer in a convenient form factor☆13Updated 7 years ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆54Updated last week
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago