NateBrune / silk-guardianLinks
<< Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious files, and turns off your computer.
☆703Updated last year
Alternatives and similar repositories for silk-guardian
Users that are interested in silk-guardian are comparing it to the libraries listed below
Sorting:
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆272Updated 5 years ago
- Onion delivery, so delicious☆204Updated 2 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,526Updated last year
- Vanguards help guard you from getting vanned...☆230Updated 11 months ago
- Enterprise Onion Toolkit☆784Updated last year
- Personal Onion Router To Assure Liberty☆826Updated 6 years ago
- Use YubiKey to unlock a LUKS partition☆844Updated last year
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,270Updated last week
- GPU-based Onion Hash generator☆1,265Updated 4 years ago
- It is important to stress that we have not written this piece of software (see LICENSE)☆383Updated 2 years ago
- Two factor authentication for harddisk encryption☆648Updated last year
- Guide to using a remote Debian server for security and privacy services☆448Updated 5 years ago
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,225Updated 2 weeks ago
- Blog-type notes about building Onion sites☆142Updated 7 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆581Updated 7 years ago
- A pam module written in C for duress codes in linux authentication☆149Updated 4 years ago
- opmsg message encryption☆753Updated 2 years ago
- vanity address generator for tor onion v3 (ed25519) hidden services☆1,400Updated last year
- a more secure way to force programs to exclusively use tor network☆200Updated 3 years ago
- An Ansible Role for Tor Relay Operators☆251Updated last month
- the Crypto Undertaker☆1,449Updated this week
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆229Updated 2 years ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)☆316Updated 2 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆360Updated 9 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- USB key cleaner☆473Updated 2 years ago
- Client side encrypted pastebin☆1,397Updated 3 months ago
- Try to find the password of a LUKS encrypted volume.☆260Updated last year
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆675Updated 6 years ago
- Qubes Security Pack☆506Updated 2 weeks ago