Lvl4Sword / KillerLinks
πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.
β71Updated 3 years ago
Alternatives and similar repositories for Killer
Users that are interested in Killer are comparing it to the libraries listed below
Sorting:
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwaresβ51Updated 6 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.β81Updated 5 years ago
- a more secure way to force programs to exclusively use tor networkβ207Updated 3 years ago
- Create torrc files optimized for speed, security, or avoiding captchasβ67Updated 4 years ago
- Twitter as an extra entropy sourceβ104Updated 7 years ago
- Dashboard to monitor Tor node operationsβ120Updated 2 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relayβ146Updated 2 years ago
- AICDL collector services and modulesβ45Updated 8 years ago
- The Seesaw pipeline grab script for the URLTeam (terroroftinytown) projectβ28Updated 5 months ago
- A pam module written in C for duress codes in linux authenticationβ150Updated 5 years ago
- Be alerted to changes to your VPN/ service providers canary noticeβ25Updated 5 years ago
- Tor traffic whitelisting gatewayβ75Updated 7 months ago
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forceβ¦β124Updated 5 years ago
- Auto discover and exploit LAN raspberry pi'sβ108Updated last year
- Instructions for setting up DNS over TLS over TORβ148Updated 5 years ago
- Stats about the Tor network (website)β42Updated 2 weeks ago
- Panic button for protection against cold boot attacksβ145Updated 3 years ago
- Configurable end to end encryption for Discordβ35Updated 6 years ago
- From Russia with love, lets traceroute the coming shutdown.β45Updated 6 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data linesβ44Updated 6 years ago
- Wipe files and drives securely with randoms ASCII dicksβ129Updated 6 years ago
- A janky framework for building Signal bots.β15Updated 5 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFCβ¦β45Updated 6 years ago
- β οΈ tor-relay.co has been discontinued and is not owned by me anymore β οΈ The tor-relay.co configuratorβ52Updated 3 years ago
- An investigation into Jacob Appelbaum leaving the Tor Projectβ99Updated 3 weeks ago
- A guidelines for hardening including custom Debian kernels,headers,firmwares,tools,jail,sandbox and configs filesβ33Updated 5 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ163Updated 3 years ago
- A PAM module that protects sensitive data and provides a panic function for emergency situations. Authentication through passwords or remβ¦β60Updated 2 years ago
- Let's brute force this hotel's tv.β82Updated 6 years ago
- IP leak prevention for OpenVPNβ146Updated 7 years ago