Kicksecure / ram-wipeLinks
Wipe RAM on shutdown and reboot - Cold Boot Attack Defense
☆12Updated 2 weeks ago
Alternatives and similar repositories for ram-wipe
Users that are interested in ram-wipe are comparing it to the libraries listed below
Sorting:
- DarkDotFail's Onion Mirror Guidelines validation library.☆10Updated 4 years ago
- An I2P based OS made for security☆11Updated 4 months ago
- A library for peer discovery inside the Tor network☆27Updated last year
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆51Updated 4 months ago
- A P2P, E2EE messenger powered by Tor's hidden services.☆14Updated 5 months ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆57Updated 2 weeks ago
- Linux kernel module to fight against police terror☆29Updated 3 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 8 months ago
- OnionComms is a repository of script to run an onion server and guides to configure client side applications to connect to any onion serv…☆14Updated 3 years ago
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆47Updated 4 months ago
- trustor (PoC)☆25Updated 3 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆15Updated 2 years ago
- Securely build a system Tor and optionally configure numerous high-security Onion services.☆50Updated 2 years ago
- A guide to downloading all public DDoSecrets releases via torrent☆52Updated last year
- Tirdad kernel module for random ISN generation☆26Updated 7 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- base files for distributions - several important miscellaneous files, such as /etc/hostname, /etc/hosts, /var/lib/dbus/machine-id and mor…☆10Updated last month
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 4 years ago
- Sanitize documents to safe PDFs, for active content removal☆39Updated 3 weeks ago
- List of Hardware Wallets for Digital Forensics☆26Updated 5 months ago
- Randomizes clock when systems boots by adding a few seconds and nanoseconds to enforce the design goal, that the host clock and Gateway/…☆13Updated 4 months ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- https://www.whonix.org/wiki/Imprint☆23Updated last month
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- Emerald Onion's Encrypted DNS Resolver☆28Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Seamless .onion and tor-ified git remotes☆28Updated 5 years ago
- Rust crate providing anonymous, secure, and private peer-to-peer functionality using Tor onion services☆37Updated 3 months ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆13Updated 6 months ago