BusKill / buskill-appLinks
BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord
☆241Updated 6 months ago
Alternatives and similar repositories for buskill-app
Users that are interested in buskill-app are comparing it to the libraries listed below
Sorting:
- The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router☆365Updated 4 months ago
- Crowdsourced tool for locating and reporting ALPRs☆242Updated last week
- A resource for users intent on optimizing their usage of this highly secure and privacy focused mobile operating system.☆126Updated 2 months ago
- ☆270Updated 2 years ago
- A comprehensive, step-by-step guide to help new users navigate the privacy-focused, security-hardened mobile OS based on Android. Learn h…☆264Updated last year
- Design requirements for an open-source USB-A magnetic breakaway connector used in the BusKill laptop kill cord☆40Updated 9 months ago
- Anonymous peer-to-peer instant messaging☆307Updated 3 weeks ago
- User-friendly Fawkes algorithm.☆86Updated 4 years ago
- Security focused USB drive.☆286Updated 6 months ago
- its like a tricorder, for your wireless world.☆95Updated last year
- A curated list of awesome qubes os links☆129Updated 6 months ago
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆305Updated this week
- An app that allows secure LUKS unlocking using usb accessory mode without typing your LUKS password☆117Updated last month
- The Privacy Spreadsheet HTML and raw CSV data☆42Updated last month
- Blocks websites from using javascript to port scan your computer/network and dynamically blocks all LexisNexis endpoints from running the…☆283Updated 5 months ago
- Log ALPR data using a Motorola vulnerability☆83Updated 9 months ago
- a tiny USB rubber ducky that can be concealed entirely inside the USB port. Various hardware improvements compared to v1☆93Updated 10 months ago
- Transform a Raspberry Pi into a relay powering the Tor Network.☆37Updated last year
- A project to rapidly extract all email addresses from any files in a given path☆185Updated last month
- A comprehensive guide for enhancing security and privacy on iOS and iPadOS devices.☆171Updated last year
- OS image for the PiRogue based on Debian 12☆161Updated last year
- stegosuite is a open source steganography tool written in java☆40Updated last month
- A command-line interface for Picocrypt.☆76Updated 3 months ago
- A practical approach to Privacy and Security☆146Updated this week
- A very small, very simple, yet very secure encryption tool.☆146Updated last week
- The comprehensive guide for online anonymity and OpSec.☆573Updated 3 weeks ago
- Command-line monitor for Tor.☆141Updated last year
- Website with comprehensive comparisons, histories, and other information across many areas of computing and technology.☆274Updated this week
- mat2 is a metadata removal tool, supporting a wide range of commonly used file formats, written in python3: at its core, it's a library…☆146Updated 2 weeks ago
- ☆144Updated 2 months ago