NateBrune / silk-guardianLinks
<< Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious files, and turns off your computer.
☆707Updated last year
Alternatives and similar repositories for silk-guardian
Users that are interested in silk-guardian are comparing it to the libraries listed below
Sorting:
- Personal Onion Router To Assure Liberty☆831Updated 6 years ago
- opmsg message encryption☆752Updated 2 years ago
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆510Updated 5 months ago
- Try to find the password of a LUKS encrypted volume.☆266Updated last year
- It is important to stress that we have not written this piece of software (see LICENSE)☆386Updated 2 years ago
- GPU-based Onion Hash generator☆1,264Updated 4 years ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆680Updated 6 years ago
- Onion delivery, so delicious☆207Updated 2 years ago
- Blog-type notes about building Onion sites☆142Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 7 years ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,284Updated 3 months ago
- A pam module written in C for duress codes in linux authentication☆149Updated 4 years ago
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,253Updated last month
- Enterprise Onion Toolkit☆785Updated last year
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)☆319Updated 3 years ago
- An Ansible Role for Tor Relay Operators☆257Updated last month
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,550Updated last year
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆687Updated 3 years ago
- Vanguards help guard you from getting vanned...☆236Updated last year
- A manager for your secrets.☆954Updated last year
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 3 years ago
- a more secure way to force programs to exclusively use tor network☆203Updated 3 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆361Updated 10 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆336Updated 8 years ago
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆364Updated 12 years ago
- A ncurses animation to make decryption look like, well, decryption.☆241Updated 5 years ago
- Qubes Security Pack☆522Updated last week
- An asemic Markov-chained cipher☆202Updated 5 years ago
- Guide to using a remote Debian server for security and privacy services☆449Updated 5 years ago