aforensics / HiddenVM
HiddenVM β Use any desktop OS without leaving a trace.
β2,435Updated 9 months ago
Alternatives and similar repositories for HiddenVM
Users that are interested in HiddenVM are comparing it to the libraries listed below
Sorting:
- πΎ dn - offline full-text search and archiving for your Chromium-based browser.β3,832Updated last week
- Simple, native and efficient local ad blocker. Only Bash.β1,828Updated 4 months ago
- Penetrum LLC opensource security tool list.β655Updated 3 years ago
- Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxyβ1,082Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimβs NAT/firewaβ¦β1,924Updated 2 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victiβ¦β1,539Updated 6 months ago
- spy on the DNS queries your computer is makingβ1,367Updated 8 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,668Updated 3 years ago
- Lockdown your linux install. The simple zero config linux hardening scriptβ369Updated 4 years ago
- Tracking history of USB events on GNU/Linuxβ1,166Updated 2 years ago
- Reverse Engineers' Hex Editorβ2,360Updated this week
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.β11,564Updated this week
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,353Updated last month
- Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexyβ4,679Updated 3 weeks ago
- Librefox: Firefox with privacy enhancementsβ1,753Updated 4 years ago
- An Open-source LTE Downlink/Uplink Eavesdropperβ1,928Updated 6 months ago
- Redirect `.idk` domains using Wikipediaβ1,527Updated last year
- An HTTP toolkit for security research.β6,903Updated 3 months ago
- Protect yourself from being tracked π by AirTags π· and Find My accessories πβ2,079Updated last week
- Log what files are accessed by any Linux processβ943Updated this week
- π Mount your browser tabs as a filesystem.β3,867Updated 4 months ago
- Like nmap for mapping wifi networks you're not connected to, plus device trackingβ2,678Updated last year
- Extract files from any kind of container formatsβ2,311Updated this week
- Serverless, peer-to-peer, local file sharing through soundβ2,265Updated 4 years ago
- SSH-MITM - ssh audits made simpleβ1,382Updated 2 months ago
- A research-based pihole list to reduce tracking by Apple and Googleβ320Updated last year
- One cert to rule them all: SSL cert that is valid for any and all domains + all levels of subdomainsβ808Updated 4 years ago
- Free cross-platform deniable encryption cryptoarchiverβ397Updated 9 months ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.β1,537Updated 5 months ago
- WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly andβ¦β4,852Updated last year