adrelanos / vpn-firewall
Leak Protection (Fail Safe Mechanism) for (Open)VPN
☆173Updated 6 years ago
Alternatives and similar repositories for vpn-firewall:
Users that are interested in vpn-firewall are comparing it to the libraries listed below
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆144Updated last year
- cryptostorm client configs☆196Updated last week
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- cryptostorm's DeepDNS, a decentralized, crypto-hardened, DNS framework☆100Updated this week
- HTTPS Everywhere rulesets for hidden services and eepsites.☆167Updated 7 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆458Updated last year
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Leakproof VPN for your Qubes OS system☆60Updated 7 years ago
- Automatic installation and configuration of DNSCrypt (on Debian + Redhat like systems). This script will install DNSCrypt and configure i…☆223Updated 6 years ago
- Qubes component: antievilmaid☆147Updated 8 months ago
- Torbutton for Thunderbird and related *bird forks☆84Updated 5 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- Tor traffic whitelisting gateway☆71Updated last week
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Usable Privacy Box☆174Updated last year
- PrivacyFox tweaks various preferences in Firefox in order to enhance the privacy of users; it will also try to enforce these changes to m…☆154Updated 7 years ago
- Explore the Tor network☆87Updated 2 years ago
- an ad- and malware-blocking script for Linux☆228Updated 3 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Snowden's toolkit — for the Rest of Us.☆72Updated 5 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆34Updated 6 years ago
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Hacker OPSEC☆96Updated 7 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Subgraph OS issues repository☆73Updated 8 years ago