Kicksecure / ram-wipeLinks
Wipe RAM on shutdown and reboot - Cold Boot Attack Defense
☆18Updated 2 weeks ago
Alternatives and similar repositories for ram-wipe
Users that are interested in ram-wipe are comparing it to the libraries listed below
Sorting:
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆61Updated 2 months ago
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆53Updated 2 months ago
- Tirdad kernel module for random ISN generation☆27Updated last year
- An I2P based OS made for security☆15Updated 10 months ago
- Sanitize documents to safe PDFs, for active content removal☆47Updated 4 months ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆67Updated last week
- Linux kernel module to fight against police terror☆30Updated 4 years ago
- DoHoT: making practical use of DNS over HTTPS over Tor☆270Updated 4 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 3 years ago
- Onionbalance -- mirror of https://gitlab.torproject.org/tpo/onion-services/onionbalance/ -- please create issues and pull requests there☆167Updated last month
- Few tools for a Tor relay.☆61Updated last week
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆255Updated 2 months ago
- a more secure way to force programs to exclusively use tor network☆207Updated 3 years ago
- gpg file verification bash library, addresses comprehensive threat model, that covers file name tampering, indefinite freeze, rollback, e…☆16Updated 2 months ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- A list of resources to help me keep track of important news/studies/projects/etc. in the privacy & security world.☆39Updated 2 years ago
- Networks and Tools that are used to access and navigate on "darknets"☆51Updated last year
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- An improved firecfg written in python.☆16Updated last year
- A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a …☆239Updated 3 months ago
- OnionComms is a repository of script to run an onion server and guides to configure client side applications to connect to any onion serv…☆15Updated 3 years ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆186Updated last year
- QubesOS wiki and simple setup scripts for use by journalists and media organizations.☆19Updated last year
- A white-label, brandable VPN Desktop Application by LEAP☆60Updated this week
- Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface☆152Updated 4 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆51Updated 2 years ago
- Command-line monitor for Tor.☆141Updated last year
- A curated list of awesome qubes os links☆133Updated 7 months ago
- A Directory For A Monero Circular Economy☆57Updated 2 weeks ago