Lvl4Sword / KillerLinks
πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.
β71Updated 2 years ago
Alternatives and similar repositories for Killer
Users that are interested in Killer are comparing it to the libraries listed below
Sorting:
- Tor traffic whitelisting gatewayβ72Updated 3 months ago
- Thinkpad X220 board that disconnects the webcam and microphone data linesβ44Updated 6 years ago
- The tor-relay.co configuratorβ52Updated 3 years ago
- The Seesaw pipeline grab script for the URLTeam (terroroftinytown) projectβ27Updated 2 weeks ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relayβ145Updated last year
- Panic button for protection against cold boot attacksβ143Updated 3 years ago
- Stats about the Tor network (website)β41Updated last month
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forceβ¦β119Updated 4 years ago
- a more secure way to force programs to exclusively use tor networkβ201Updated 3 years ago
- Auto discover and exploit LAN raspberry pi'sβ108Updated last year
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.β73Updated 5 years ago
- Wipe files and drives securely with randoms ASCII dicksβ128Updated 5 years ago
- Dashboard to monitor Tor node operationsβ121Updated 2 years ago
- Create torrc files optimized for speed, security, or avoiding captchasβ67Updated 3 years ago
- A guidelines for hardening including custom Debian kernels,headers,firmwares,tools,jail,sandbox and configs filesβ33Updated 5 years ago
- An investigation into Jacob Appelbaum leaving the Tor Projectβ98Updated last year
- Be alerted to changes to your VPN/ service providers canary noticeβ26Updated 5 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth framesβ32Updated 14 years ago
- From Russia with love, lets traceroute the coming shutdown.β45Updated 6 years ago
- Twitter as an extra entropy sourceβ103Updated 7 years ago
- Snowden's toolkit β for the Rest of Us.β72Updated 6 years ago
- Explore the Tor networkβ88Updated 2 years ago
- Browser agnostic extension that enables pasting into password fields...β15Updated 5 years ago
- Instructions for setting up DNS over TLS over TORβ149Updated 5 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFCβ¦β45Updated 6 years ago
- Vanguards help guard you from getting vanned...β231Updated last year
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.β51Updated 8 years ago
- AICDL collector services and modulesβ45Updated 8 years ago
- tor-openwrtβ40Updated 9 years ago
- bash code to calculate the standard passwords from your ISP routerβ38Updated 5 years ago