Lvl4Sword / Killer
πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.
β71Updated 2 years ago
Alternatives and similar repositories for Killer:
Users that are interested in Killer are comparing it to the libraries listed below
- From Russia with love, lets traceroute the coming shutdown.β45Updated 5 years ago
- Panic button for protection against cold boot attacksβ141Updated 3 years ago
- Configurable end to end encryption for Discordβ35Updated 5 years ago
- Let's brute force this hotel's tv.β77Updated 5 years ago
- AICDL collector services and modulesβ45Updated 7 years ago
- Twitter as an extra entropy sourceβ100Updated 6 years ago
- Be alerted to changes to your VPN/ service providers canary noticeβ26Updated 5 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data linesβ43Updated 6 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relayβ145Updated last year
- Auto discover and exploit LAN raspberry pi'sβ107Updated 11 months ago
- A guidelines for hardening including custom Debian kernels,headers,firmwares,tools,jail,sandbox and configs filesβ33Updated 5 years ago
- Explore the Tor networkβ87Updated 2 years ago
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forceβ¦β115Updated 4 years ago
- The Seesaw pipeline grab script for the URLTeam (terroroftinytown) projectβ27Updated 7 months ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.β18Updated 7 years ago
- The tor-relay.co configuratorβ52Updated 3 years ago
- the safest place to reach outβ26Updated 3 months ago
- Tor traffic whitelisting gatewayβ70Updated 2 months ago
- Stats about the Tor network (website)β39Updated this week
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth framesβ33Updated 13 years ago
- HOWTO: Firejailed Tor Browserβ30Updated 3 months ago
- A PAM module that protects sensitive data and provides a panic function for emergency situations. Authentication through passwords or remβ¦β57Updated 2 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumesβ17Updated 4 years ago
- Snowden's toolkit β for the Rest of Us.β72Updated 5 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwaresβ50Updated 5 years ago
- MAC spoofing with a restricted range of OUI prefixesβ70Updated 7 years ago
- bash code to calculate the standard passwords from your ISP routerβ38Updated 5 years ago
- A mycroft skill wrapper around a subset of aircrack-ngβ17Updated 2 years ago
- Mass Discord Message Delete Scriptβ9Updated 7 years ago
- Host a Tor hidden service inside a Docker container without exposing any clearnet ports.β46Updated 2 years ago