BusKill / veracrypt-self-destructLinks
Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes
☆17Updated 5 years ago
Alternatives and similar repositories for veracrypt-self-destruct
Users that are interested in veracrypt-self-destruct are comparing it to the libraries listed below
Sorting:
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆66Updated last week
- Securely build a system Tor and optionally configure numerous high-security Onion services.☆51Updated 2 years ago
- I2P in Private Browsing mode for Firefox, built using Webextensions and Contextual Identities☆76Updated 8 months ago
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆52Updated last month
- Antiforensic actions to secure your device if it's physically stolen from you☆14Updated 2 years ago
- YAP! - Yet Another PGP Tool☆18Updated 4 years ago
- Gain access to Lokinet and the internet connecting via an SBC based access point.☆34Updated 3 years ago
- i2pd documentation☆29Updated last week
- tor/i2p/lokinet socks proxy router☆33Updated last year
- A white-label, brandable VPN Desktop Application by LEAP☆60Updated last week
- AppArmor profile for The Tor Browser Bundle (TBB) - https://www.whonix.org/wiki/AppArmor - for better security (hardening).☆20Updated last month
- ☆14Updated 2 years ago
- a control panel for managing Lokinet☆19Updated 3 years ago
- hostnames registration application for I2P☆11Updated 3 years ago
- Do $things over the internet, verified by PGP☆51Updated 3 years ago
- A simple tool to securely communicate with others.☆19Updated 2 years ago
- Tor v3 onion services (hidden services) for Docker containers☆77Updated 5 years ago
- Few tools for a Tor relay.☆58Updated last week
- gpg file verification bash library, addresses comprehensive threat model, that covers file name tampering, indefinite freeze, rollback, e…☆16Updated last month
- Super simple standalone http proxy for i2p using SAM. (Also part of https://github.com/eyedeekay/sam-forwarder)☆10Updated 3 years ago
- Python package to encode THREE QR codes into ONE.☆11Updated 3 years ago
- Easy to install, privacy protection browser setup. A collection of best browser extensions and configurations to help you fight for your …☆26Updated 5 years ago
- Automated 🧅 Tor ❄️ Snowflake Proxy (any Linux device). Run install.sh and you have a new Snowflake ProxyService (every boot)☆28Updated last year
- session F-Droid repo☆27Updated last year
- Audited, Open-Source Email Aliasing Service☆37Updated this week
- ☆12Updated 5 years ago
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆254Updated last month
- a framework for providing trusted connections between panic button apps and other apps that should be triggered by them☆50Updated 2 years ago
- Complexity is beautiful. Anyware, everyone. Completed.☆79Updated this week
- A list of resources to help me keep track of important news/studies/projects/etc. in the privacy & security world.☆39Updated 2 years ago