<< Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious files, and turns off your computer.
☆720Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for silk-guardian
Users that are interested in silk-guardian are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,583Mar 1, 2024Updated 2 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆129Jun 12, 2017Updated 8 years ago
- Hourglass cryptographically locks your files so they can only be read after a certain amount of time.☆25Jul 4, 2016Updated 9 years ago
- Deadman is linux kernel module deadman-switch that responds to removal of a specific USB device (or the insertion of any).☆12Mar 9, 2023Updated 3 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Oct 9, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,332Jan 27, 2026Updated 3 months ago
- Grub with Deniable LUKS header crypto extension☆13Jan 6, 2018Updated 8 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆70Nov 28, 2021Updated 4 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Sep 20, 2017Updated 8 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,548Apr 17, 2026Updated last week
- Postfix helper for mandatory TLS☆18Jan 20, 2022Updated 4 years ago
- kdf password strengthener☆10Dec 26, 2019Updated 6 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆990Nov 27, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- GPU-based Onion Hash generator☆1,275Nov 9, 2020Updated 5 years ago
- Lock encrypted root volume on suspend in Debian☆15Apr 28, 2020Updated 6 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,458Nov 26, 2018Updated 7 years ago
- Telegram Flooder☆13Jun 28, 2018Updated 7 years ago
- A collection of anti-forensics scripts☆30Oct 19, 2025Updated 6 months ago
- Securely and anonymously share files, host websites, and chat with friends using the Tor network☆6,934Mar 11, 2026Updated last month
- Detect snooper on your system!☆84Feb 6, 2017Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- for the louise☆243Aug 9, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,605Jun 13, 2025Updated 10 months ago
- Remote control retroshare-nogui from your Android device☆35Sep 4, 2013Updated 12 years ago
- Linux kernel module to fight against police terror☆30Aug 29, 2021Updated 4 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,659Jul 18, 2024Updated last year
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆272Mar 16, 2026Updated last month
- ⛵️ Available - Crystal SOCKS Client and Server☆14Mar 27, 2021Updated 5 years ago
- "Advertising has us chasing cars and clothes, working jobs we hate so we can buy shit we don't need" (Fight Club)☆34Aug 3, 2015Updated 10 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆705May 13, 2022Updated 3 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆942Aug 31, 2022Updated 3 years ago
- Preventing OS X from phoning home to Cupertino☆298Jul 8, 2018Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Feb 19, 2019Updated 7 years ago
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,931May 28, 2024Updated last year
- Exploitation Framework for Embedded Devices☆13,083Mar 2, 2026Updated last month
- Guide to using a remote Debian server for security and privacy services☆451Feb 2, 2020Updated 6 years ago