Kicksecure / ram-wipeLinks
Wipe RAM on shutdown and reboot - Cold Boot Attack Defense
☆19Updated 2 months ago
Alternatives and similar repositories for ram-wipe
Users that are interested in ram-wipe are comparing it to the libraries listed below
Sorting:
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆53Updated 4 months ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆58Updated 2 weeks ago
- An I2P based OS made for security☆13Updated 11 months ago
- Few tools for a Tor relay.☆65Updated this week
- Onionbalance -- mirror of https://gitlab.torproject.org/tpo/onion-services/onionbalance/ -- please create issues and pull requests there☆171Updated last week
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 3 years ago
- A list of resources to help me keep track of important news/studies/projects/etc. in the privacy & security world.☆40Updated 2 years ago
- List of Hardware Wallets for Digital Forensics☆26Updated last year
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- My blog about Cybersecurity, Privacy and Systems :)☆43Updated 3 weeks ago
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆253Updated 3 months ago
- Tirdad kernel module for random ISN generation☆28Updated last year
- A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a …☆251Updated 4 months ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆198Updated last year
- Linux kernel module to fight against police terror☆31Updated 4 years ago
- A Directory For A Monero Circular Economy☆58Updated 2 weeks ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- A library for peer discovery inside the Tor network☆28Updated last year
- gpg file verification bash library, addresses comprehensive threat model, that covers file name tampering, indefinite freeze, rollback, e…☆16Updated 2 weeks ago
- Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface☆152Updated 4 years ago
- https://www.whonix.org/wiki/Imprint☆33Updated 2 weeks ago
- ☆13Updated 3 years ago
- An improved firecfg written in python.☆15Updated last year
- a more secure way to force programs to exclusively use tor network☆206Updated 3 years ago
- An insightful collection of my favorite podcasts focusing on privacy, cybersecurity, and digital rights. Explore various perspectives on …☆22Updated last year
- DoHoT: making practical use of DNS over HTTPS over Tor☆274Updated 4 years ago
- A white-label, brandable VPN Desktop Application by LEAP☆61Updated this week
- Sanitize documents to safe PDFs, for active content removal☆47Updated 5 months ago
- insta-onion: Create a Tor Onion service in 20 seconds☆14Updated 5 years ago
- ☆156Updated last year