Lvl4Sword / KillerLinks
πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.
β71Updated 2 years ago
Alternatives and similar repositories for Killer
Users that are interested in Killer are comparing it to the libraries listed below
Sorting:
- Twitter as an extra entropy sourceβ104Updated 7 years ago
- Create torrc files optimized for speed, security, or avoiding captchasβ67Updated 3 years ago
- Dashboard to monitor Tor node operationsβ121Updated 2 years ago
- a more secure way to force programs to exclusively use tor networkβ202Updated 3 years ago
- Tor traffic whitelisting gatewayβ73Updated 4 months ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relayβ145Updated 2 years ago
- AICDL collector services and modulesβ45Updated 8 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data linesβ44Updated 6 years ago
- Stats about the Tor network (website)β41Updated 2 weeks ago
- Panic button for protection against cold boot attacksβ145Updated 3 years ago
- A guidelines for hardening including custom Debian kernels,headers,firmwares,tools,jail,sandbox and configs filesβ33Updated 5 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.β76Updated 5 years ago
- The tor-relay.co configuratorβ52Updated 3 years ago
- The Seesaw pipeline grab script for the URLTeam (terroroftinytown) projectβ28Updated last month
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forceβ¦β119Updated 4 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwaresβ50Updated 6 years ago
- Script to add iptables rules (on a linux system) that force all traffic through torβ39Updated 10 years ago
- Be alerted to changes to your VPN/ service providers canary noticeβ26Updated 5 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ163Updated 3 years ago
- A pam module written in C for duress codes in linux authenticationβ149Updated 4 years ago
- An investigation into Jacob Appelbaum leaving the Tor Projectβ99Updated last year
- Auto discover and exploit LAN raspberry pi'sβ108Updated last year
- From Russia with love, lets traceroute the coming shutdown.β45Updated 6 years ago
- A PAM module that protects sensitive data and provides a panic function for emergency situations. Authentication through passwords or remβ¦β59Updated 2 years ago
- Secure/anonymous IRC-like chat using TOR hidden servicesβ40Updated 12 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )β127Updated 4 years ago
- Wipe files and drives securely with randoms ASCII dicksβ131Updated 5 years ago
- Onion delivery, so deliciousβ207Updated 2 years ago
- cicada-2014β49Updated 3 years ago
- Router Keygen generate default WPA/WEP keys for several routers.β96Updated 3 years ago