Lvl4Sword / KillerLinks
πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.
β71Updated 2 years ago
Alternatives and similar repositories for Killer
Users that are interested in Killer are comparing it to the libraries listed below
Sorting:
- Dashboard to monitor Tor node operationsβ121Updated 2 years ago
- Wipe files and drives securely with randoms ASCII dicksβ131Updated 5 years ago
- Tor traffic whitelisting gatewayβ74Updated 6 months ago
- The Seesaw pipeline grab script for the URLTeam (terroroftinytown) projectβ28Updated 3 months ago
- β οΈ tor-relay.co has been discontinued and is not owned by me anymore β οΈ The tor-relay.co configuratorβ52Updated 3 years ago
- Auto discover and exploit LAN raspberry pi'sβ108Updated last year
- Vanguards help guard you from getting vanned...β235Updated last year
- Script to bootstrap a Debian server to be a set-and-forget Tor relayβ146Updated 2 years ago
- An investigation into Jacob Appelbaum leaving the Tor Projectβ99Updated last year
- Create torrc files optimized for speed, security, or avoiding captchasβ68Updated 3 years ago
- Panic button for protection against cold boot attacksβ145Updated 3 years ago
- a more secure way to force programs to exclusively use tor networkβ206Updated 3 years ago
- Stats about the Tor network (website)β41Updated 3 weeks ago
- Like Tor2Web, but not just HTTP ( using IPv6 )β127Updated 4 years ago
- A guidelines for hardening including custom Debian kernels,headers,firmwares,tools,jail,sandbox and configs filesβ33Updated 5 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data linesβ44Updated 6 years ago
- A pam module written in C for duress codes in linux authenticationβ150Updated 5 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.β81Updated 5 years ago
- Twitter as an extra entropy sourceβ104Updated 7 years ago
- Let's brute force this hotel's tv.β82Updated 5 years ago
- β38Updated 3 years ago
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forceβ¦β122Updated 4 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.β90Updated 3 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β243Updated 4 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwaresβ51Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ163Updated 3 years ago
- An audio firewall for Chrome!β71Updated last year
- MAC spoofing with a restricted range of OUI prefixesβ70Updated 8 years ago
- From Russia with love, lets traceroute the coming shutdown.β45Updated 6 years ago
- Blog-type notes about building Onion sitesβ143Updated 8 years ago