NateBrune / silk-guardianLinks
<< Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious files, and turns off your computer.
☆706Updated last year
Alternatives and similar repositories for silk-guardian
Users that are interested in silk-guardian are comparing it to the libraries listed below
Sorting:
- Personal Onion Router To Assure Liberty☆830Updated 6 years ago
- Try to find the password of a LUKS encrypted volume.☆265Updated last year
- opmsg message encryption☆753Updated 2 years ago
- Enterprise Onion Toolkit☆785Updated last year
- Onion delivery, so delicious☆205Updated 2 years ago
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆507Updated 4 months ago
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,238Updated last week
- It is important to stress that we have not written this piece of software (see LICENSE)☆384Updated 2 years ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,280Updated 2 months ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆676Updated 6 years ago
- Blog-type notes about building Onion sites☆142Updated 7 years ago
- GPU-based Onion Hash generator☆1,266Updated 4 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 7 years ago
- A pam module written in C for duress codes in linux authentication☆149Updated 4 years ago
- the Crypto Undertaker☆1,472Updated this week
- An asemic Markov-chained cipher☆203Updated 4 years ago
- An Ansible Role for Tor Relay Operators☆253Updated 3 months ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆362Updated 10 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)☆318Updated 2 years ago
- Two factor authentication for harddisk encryption☆653Updated last year
- INTERLOCK - file encryption and HSM front-end☆305Updated 4 months ago
- A manager for your secrets.☆951Updated last year
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,539Updated last year
- Use YubiKey to unlock a LUKS partition☆853Updated last year
- a more secure way to force programs to exclusively use tor network☆201Updated 3 years ago
- Linux kernel mode debugfs keylogger☆671Updated 3 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆335Updated 7 years ago
- A ncurses animation to make decryption look like, well, decryption.☆242Updated 5 years ago
- ☆222Updated 7 years ago