NSAKEY / paranoid-prosodyLinks
Script and files to set up Prosody with reasonably paranoid defaults and to allow hidden service connections over Tor.
☆11Updated 10 years ago
Alternatives and similar repositories for paranoid-prosody
Users that are interested in paranoid-prosody are comparing it to the libraries listed below
Sorting:
- Dashboard to monitor Tor node operations☆121Updated 2 years ago
- a more secure way to force programs to exclusively use tor network☆206Updated 3 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆145Updated 2 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆68Updated 3 years ago
- Leak Protection (Fail Safe Mechanism) for (Open)VPN☆174Updated 6 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- Explore the Tor network☆89Updated 2 years ago
- tor-openwrt☆40Updated 9 years ago
- KeePass 2 database master-password cracker☆135Updated 7 years ago
- TOR Mail encrypted server for Hidden Services☆42Updated 9 years ago
- OnionTip is a web app which parses Tor relay data to allow users to tip volunteers for running relay in a fair and open way.☆53Updated 7 years ago
- Vanguards help guard you from getting vanned...☆235Updated last year
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- Secure SSH server using onion service.☆18Updated 9 years ago
- Usable Privacy Box☆171Updated last year
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- Simple detector of ARP poisoning attack☆29Updated 10 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆131Updated 8 years ago
- cryptostorm's DeepDNS, a decentralized, crypto-hardened, DNS framework☆101Updated last month
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆37Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Easily setup a hidden service inside the Tor network☆175Updated 2 years ago
- It is important to stress that we have not written this piece of software (see LICENSE)☆386Updated 2 years ago
- Config generator for chaos vpn☆120Updated 3 years ago
- Tor traffic whitelisting gateway☆73Updated 6 months ago
- A script used to create a whonix like gateway/workstation environment with docker containers.☆125Updated 6 years ago
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆254Updated 3 weeks ago
- WiFi Jamming tool☆103Updated 12 years ago
- A standalone addon for GnuPG☆18Updated 6 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆268Updated 11 years ago