<< Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious files, and turns off your computer.
☆720Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for silk-guardian
Users that are interested in silk-guardian are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,578Mar 1, 2024Updated 2 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆129Jun 12, 2017Updated 8 years ago
- Deadman is linux kernel module deadman-switch that responds to removal of a specific USB device (or the insertion of any).☆12Mar 9, 2023Updated 3 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Oct 9, 2017Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,321Jan 27, 2026Updated 2 months ago
- Grub with Deniable LUKS header crypto extension☆13Jan 6, 2018Updated 8 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,182Mar 11, 2026Updated 3 weeks ago
- Create torrc files optimized for speed, security, or avoiding captchas☆69Nov 28, 2021Updated 4 years ago
- kdf password strengthener☆10Dec 26, 2019Updated 6 years ago
- GPU-based Onion Hash generator☆1,274Nov 9, 2020Updated 5 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,451Nov 26, 2018Updated 7 years ago
- Telegram Flooder☆13Jun 28, 2018Updated 7 years ago
- Securely and anonymously share files, host websites, and chat with friends using the Tor network☆6,927Mar 11, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Detect snooper on your system!☆84Feb 6, 2017Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆531Mar 1, 2024Updated 2 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,604Jun 13, 2025Updated 9 months ago
- Remote control retroshare-nogui from your Android device☆35Sep 4, 2013Updated 12 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,654Jul 18, 2024Updated last year
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆269Mar 16, 2026Updated 3 weeks ago
- "Advertising has us chasing cars and clothes, working jobs we hate so we can buy shit we don't need" (Fight Club)☆34Aug 3, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆703May 13, 2022Updated 3 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆939Aug 31, 2022Updated 3 years ago
- Preventing OS X from phoning home to Cupertino☆298Jul 8, 2018Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Feb 19, 2019Updated 7 years ago
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,925May 28, 2024Updated last year
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- Guide to using a remote Debian server for security and privacy services☆450Feb 2, 2020Updated 6 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,236Oct 4, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆52Aug 31, 2016Updated 9 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,658Nov 24, 2020Updated 5 years ago
- Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor brid…☆23,654May 4, 2021Updated 4 years ago
- get things from one computer to another, safely☆22,478Mar 17, 2026Updated 3 weeks ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,325Jul 27, 2021Updated 4 years ago