An easy to use censorship simulating access point in a box
☆27Jul 20, 2017Updated 8 years ago
Alternatives and similar repositories for copilot
Users that are interested in copilot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessmen…☆19Sep 29, 2017Updated 8 years ago
- ☆14Jan 31, 2018Updated 8 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Oct 30, 2024Updated last year
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Content management with Github hosted Markdown as an authoritative data source☆37Mar 12, 2023Updated 3 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Apr 21, 2026Updated last week
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- LevelUp project website☆32Apr 19, 2026Updated last week
- Planning for next generation secure chat.☆37Mar 12, 2015Updated 11 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to …☆68Mar 12, 2023Updated 3 years ago
- Distributed, tamper-resistant circumvention tools☆52Mar 6, 2016Updated 10 years ago
- EECS4080 Project at York University. A distribute proxy system to circumvent content filtering firewall. Data units are randomly distribu…☆13Oct 23, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆64Jul 17, 2012Updated 13 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14May 23, 2018Updated 7 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Feb 11, 2026Updated 2 months ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- A programming language targeting 8bit ATMEL AVR microcontrollers. Implemented using OCaml and Menhir.☆12Oct 15, 2016Updated 9 years ago
- Functional Linear Algebra with Block Matrices☆11Feb 17, 2022Updated 4 years ago
- activist.js is a drop-in library for resilience to network interference☆31Mar 15, 2022Updated 4 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Feb 4, 2024Updated 2 years ago
- Sets of Half-Average Nulls Generate Risk-Limiting Audits: tools for assertion-based risk-limiting election audits☆11Apr 21, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Apr 25, 2025Updated last year
- Python-Markdown GitHub Links Extension☆15Sep 4, 2025Updated 7 months ago
- Analysis of the CensoredPlanet data.☆20Jun 29, 2025Updated 10 months ago
- Combinators for bidirectional JSON parsing☆21May 29, 2014Updated 11 years ago
- Test and report p2p connectivity on the current network☆30Apr 8, 2022Updated 4 years ago
- A lightweight (<1kb minified + gzipped) JavaScript library that lets you wield diæreses like C̶h̶u̶c̶k̶ Mary Norris:☆14Dec 15, 2016Updated 9 years ago
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆18Mar 30, 2023Updated 3 years ago
- Experimental web browser☆21Mar 15, 2012Updated 14 years ago
- torbsd web pages☆13Sep 6, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [USENIX Security 24] Cloud-hosted proxies/VPNs with minimal cost and maximum circumvention utility☆23Feb 21, 2025Updated last year
- ARCHIVED--Coordination for State of Our Networks 2019 on September 20–22, 2019 😱☆11Jan 27, 2020Updated 6 years ago
- 🔒🎄☆13Jan 3, 2024Updated 2 years ago
- Scripts to backfill the Bluesky AppView☆26Sep 13, 2025Updated 7 months ago
- Spoiler Protection tool for Bluesky build with AT Protocol.☆15Updated this week
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- PDF Structure and Syntactic Analysis for Metadata Extraction and Tagging - https://code.google.com/p/pdfssa4met/☆19Mar 6, 2013Updated 13 years ago