BusKill / buskill-appLinks
BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord
☆262Updated 8 months ago
Alternatives and similar repositories for buskill-app
Users that are interested in buskill-app are comparing it to the libraries listed below
Sorting:
- The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router☆382Updated 6 months ago
- Crowdsourced tool for locating and reporting ALPRs☆377Updated this week
- A curated list of awesome qubes os links☆137Updated 8 months ago
- ☆268Updated 2 years ago
- Anonymous peer-to-peer instant messaging☆330Updated last month
- Design requirements for an open-source USB-A magnetic breakaway connector used in the BusKill laptop kill cord☆41Updated 11 months ago
- A practical approach to Privacy and Security☆155Updated this week
- A comprehensive, step-by-step guide to help new users navigate the privacy-focused, security-hardened mobile OS based on Android. Learn h…☆298Updated last year
- Security focused USB drive.☆289Updated 8 months ago
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆310Updated this week
- its like a tricorder, for your wireless world.☆95Updated last year
- Simple random DNS, HTTP/S internet traffic noise generator in a Docker container☆103Updated this week
- List of useful things☆83Updated this week
- mat2 is a metadata removal tool, supporting a wide range of commonly used file formats, written in python3: at its core, it's a library, …☆92Updated 2 years ago
- An app that allows secure LUKS unlocking using usb accessory mode without typing your LUKS password☆123Updated 3 months ago
- mat2 is a metadata removal tool, supporting a wide range of commonly used file formats, written in python3: at its core, it's a library…☆200Updated 3 weeks ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆151Updated 2 years ago
- a tiny USB rubber ducky that can be concealed entirely inside the USB port. Various hardware improvements compared to v1☆94Updated last year
- Independent research white paper by Jon “GainSec” Gaines examining the security posture of a connected public safety technology ecosystem…☆156Updated 2 months ago
- stegosuite is a open source steganography tool written in java☆44Updated 3 months ago
- Log ALPR data using a Motorola vulnerability☆83Updated 11 months ago
- Transform a Raspberry Pi into a relay powering the Tor Network.☆37Updated last year
- The comprehensive guide for online anonymity and OpSec.☆645Updated 3 weeks ago
- Offers a wide range of opinionated settings that prioritize privacy, security, and usability for a curated set of Linux programs.☆84Updated 3 weeks ago
- ☆144Updated 4 months ago
- User-friendly Fawkes algorithm.☆84Updated 4 years ago
- ☆13Updated 3 weeks ago
- BusKill kill cord for Linux☆35Updated 5 years ago
- A comprehensive guide for enhancing security and privacy on iOS and iPadOS devices.☆248Updated last year
- A command-line interface for Picocrypt.☆75Updated 5 months ago