Kicksecure / ram-wipeLinks
Wipe RAM on shutdown and reboot - Cold Boot Attack Defense
☆15Updated 2 months ago
Alternatives and similar repositories for ram-wipe
Users that are interested in ram-wipe are comparing it to the libraries listed below
Sorting:
- An I2P based OS made for security☆11Updated 6 months ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆54Updated 6 months ago
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆49Updated this week
- Tirdad kernel module for random ISN generation☆26Updated 9 months ago
- Onionbalance -- mirror of https://gitlab.torproject.org/tpo/onion-services/onionbalance/ -- please create issues and pull requests there☆161Updated this week
- A list of resources to help me keep track of important news/studies/projects/etc. in the privacy & security world.☆39Updated 2 years ago
- OnionComms is a repository of script to run an onion server and guides to configure client side applications to connect to any onion serv…☆15Updated 3 years ago
- Few tools for a Tor relay.☆56Updated this week
- Linux kernel module to fight against police terror☆29Updated 3 years ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆59Updated this week
- A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a …☆222Updated 2 months ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆185Updated last year
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆249Updated 11 months ago
- DoHoT: making practical use of DNS over HTTPS over Tor☆260Updated 3 years ago
- gpg file verification bash library, addresses comprehensive threat model, that covers file name tampering, indefinite freeze, rollback, e…☆17Updated this week
- Tor DDoS Protection - iptables rules for Tor relay operators to mitigate DDoS☆73Updated 8 months ago
- A white-label, brandable VPN Desktop Application by LEAP☆51Updated this week
- A Directory For A Monero Circular Economy☆57Updated 3 weeks ago
- This is a collection of useful websites and tools/software for programming.☆18Updated 2 months ago
- Vanguards help guard you from getting vanned...☆231Updated last year
- a more secure way to force programs to exclusively use tor network☆201Updated 3 years ago
- This is a setup for a Tor based mail hosting server☆26Updated 5 months ago
- Sanitize documents to safe PDFs, for active content removal☆40Updated this week
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆25Updated 11 months ago
- QubesOS wiki and simple setup scripts for use by journalists and media organizations.☆20Updated 10 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 2 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- Networks and Tools that are used to access and navigate on "darknets"☆50Updated last year
- ☆12Updated 2 years ago
- An improved firecfg written in python.☆18Updated last year