aforensics / HiddenVMLinks
HiddenVM — Use any desktop OS without leaving a trace.
☆2,449Updated 11 months ago
Alternatives and similar repositories for HiddenVM
Users that are interested in HiddenVM are comparing it to the libraries listed below
Sorting:
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,352Updated 3 months ago
- Simple, native and efficient local ad blocker. Only Bash.☆1,834Updated 6 months ago
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxy☆1,091Updated last year
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,680Updated last year
- Connect like there is no firewall. Securely.☆1,700Updated 3 weeks ago
- Peer authenticated WebRTC.☆1,848Updated 3 weeks ago
- Tracking history of USB events on GNU/Linux☆1,169Updated 2 years ago
- Lockdown your linux install. The simple zero config linux hardening script☆370Updated 5 years ago
- 💾 dn - offline full-text search and archiving for your Chromium-based browser.☆3,846Updated last month
- WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and…☆4,869Updated last week
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆2,152Updated 2 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,927Updated 2 years ago
- An experiment in scalable routing as an encrypted IPv6 overlay network☆4,027Updated this week
- Serverless, peer-to-peer, local file sharing through sound☆2,271Updated 4 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,686Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,276Updated 2 months ago
- Key management is hard☆919Updated last year
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,147Updated last month
- Lokinet is an anonymous, decentralized and IP based overlay network for the internet.☆1,884Updated 2 months ago
- Penetrum LLC opensource security tool list.☆655Updated 3 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,208Updated 2 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,551Updated 7 months ago
- SSH tarpit that slowly sends an endless banner☆8,025Updated last year
- Semi-automatic OSINT framework and package manager☆2,255Updated 4 months ago
- UAC bypass, Elevate, Persistence methods☆2,689Updated 2 years ago
- Various tips & tricks☆3,455Updated last week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,568Updated 3 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆6,484Updated last year
- An archiving tool with an IM-style interface that prioritizes privacy and accessibility, integrated with various archival services includ…☆1,985Updated this week