BusKill / awesome-buskill-triggersLinks
Antiforensic actions to secure your device if it's physically stolen from you
☆14Updated 2 years ago
Alternatives and similar repositories for awesome-buskill-triggers
Users that are interested in awesome-buskill-triggers are comparing it to the libraries listed below
Sorting:
- BusKill kill cord for Linux☆35Updated 5 years ago
- Actual good v3 onion links☆14Updated 2 weeks ago
- Securely build a system Tor and optionally configure numerous high-security Onion services.☆51Updated 2 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- Python package to encode THREE QR codes into ONE.☆11Updated 3 years ago
- A guide to downloading all public DDoSecrets releases via torrent☆75Updated last week
- Design requirements for an open-source USB-A magnetic breakaway connector used in the BusKill laptop kill cord☆41Updated 11 months ago
- All the info you need.☆19Updated 2 years ago
- miscellaneous Great Scott Gadgets projects☆20Updated 6 months ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated last month
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- A simple mesh network communications app powered by the Reticulum Network Stack.☆13Updated 2 months ago
- Spot the Surveillance is an open-source educational VR tool to help people identify street-level surveillance in their community. As each…☆37Updated 5 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆81Updated 5 years ago
- An awesome list for all the awesome stuff I do. 🕶️☆29Updated 2 years ago
- Raspberry Pi Zero exploiting gadget using ethernet over USB☆47Updated 3 years ago
- Remote neural monitoring, interconnected terrestrial and satellites radio networks. Church, state, military forces and nobles illegal con…☆25Updated 2 years ago
- Arduino Library for the Lepton FLiR Thermal Camera Module.☆12Updated 7 years ago
- My blog about Cybersecurity, Privacy and Systems :)☆42Updated last week
- Networks and Tools that are used to access and navigate on "darknets"☆51Updated last year
- Transform a Raspberry Pi into a relay powering the Tor Network.☆37Updated last year
- Builder Repository for Coreboot with Tianocore Firmware☆13Updated last year
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆46Updated 3 years ago
- Python based Oxen blockchain explorer☆14Updated 8 months ago
- Detect jamming on ISM bands using an RTLSDR dongle and a Raspberry Pi or laptop PC☆35Updated 8 years ago
- software for the Girl Tech IM-Me☆12Updated 10 years ago
- ☆14Updated 4 months ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆67Updated 2 weeks ago
- transparent TCP-to-proxy redirector☆16Updated 6 years ago
- Data recovery solutions☆23Updated 4 years ago