How to disable Firefox Telemetry and Data Collection
☆447Apr 12, 2024Updated last year
Alternatives and similar repositories for Disable-Firefox-Telemetry-and-Data-Collection
Users that are interested in Disable-Firefox-Telemetry-and-Data-Collection are comparing it to the libraries listed below
Sorting:
- Sample ChatGPT-style Q&A app via RAG-pattern on Video transcripts.☆16Jan 10, 2024Updated 2 years ago
- The best Meta Search engine running on simple PHP servers or localhosts that keeps privacy and ease of use in mind!☆131Dec 3, 2025Updated 3 months ago
- Block any extension or website from accessing network☆43Sep 25, 2023Updated 2 years ago
- 🧸 fully isolated honeypot ssh server using thrussh☆278Nov 19, 2024Updated last year
- This script creates a trimmed-down Windows 11 image, based on tiny11builder☆114Feb 10, 2025Updated last year
- ☆167Jul 23, 2024Updated last year
- Compare different privacy-oriented browsers and find the best private browser(s) for your use.☆18Feb 6, 2025Updated last year
- Manifest V3 web extension for dynamic user specified actions☆15Dec 11, 2023Updated 2 years ago
- TereStun — STUN over Teredo☆16Jan 20, 2023Updated 3 years ago
- Firefox user.js for optimal privacy and security. Your favorite browser, but better.☆10,149Feb 28, 2026Updated last week
- ☆28Apr 19, 2025Updated 10 months ago
- An I2P based OS made for security☆14Feb 7, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ESP32 based Wi-Fi Intrusion Detection System☆28May 11, 2025Updated 9 months ago
- Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening☆12,275Updated this week
- Text Behind Video. Enjoy it is completely free.☆31Feb 15, 2025Updated last year
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆188Jul 25, 2024Updated last year
- WebCall for Android - Web-Telephony P2P Messaging File-Exchange E2E-Encryption No-SIM☆129Sep 27, 2023Updated 2 years ago
- Web browser for embedded systems.☆16Jan 13, 2023Updated 3 years ago
- ☆14Feb 17, 2022Updated 4 years ago
- An open source browser extension to help declutter Youtube's UI☆74Jul 24, 2025Updated 7 months ago
- An Android app with the only goal of being a secure, locked, no-third party, completely local open source password saving app☆34May 12, 2025Updated 9 months ago
- A drop-in replacement to Apple Hearing - Background Sounds with over 30+ available sounds.☆98Apr 15, 2024Updated last year
- ☆18Sep 14, 2021Updated 4 years ago
- A checker designed in Python 3 for checking proxy.☆79Sep 30, 2021Updated 4 years ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆499Jul 27, 2023Updated 2 years ago
- Tool to securely and efficiently wipe devices and partiitions for Linux☆146Feb 5, 2026Updated last month
- CryptoFrame is a command-line tool engineered for the secure practice of steganography within video files.☆45Jan 18, 2024Updated 2 years ago
- ☆20Sep 24, 2025Updated 5 months ago
- Chrome extension that automatically clicks on 'New to you' button on Youtube home page☆13Feb 25, 2024Updated 2 years ago
- SSS (Super ScreenShot) is a WIP: CLI/Lib to take amazing screenshot of code or screen☆123Aug 14, 2025Updated 6 months ago
- lmt is a cli program written in go that can be used to run applications with resource limits enforced using cgroupsv2☆86Feb 4, 2025Updated last year
- Generate a QR code with your wifi credentials☆66Oct 19, 2024Updated last year
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆555Jul 26, 2025Updated 7 months ago
- Ask your language model a question from the terminal☆21Nov 24, 2025Updated 3 months ago
- A chrome extension to remove shorts from youtube.com☆39Nov 8, 2023Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Reverse proxies cheatsheet☆26Nov 4, 2023Updated 2 years ago