alecmuffett / drafts-not-complete-not-tested-do-not-use
☆33Updated 8 years ago
Alternatives and similar repositories for drafts-not-complete-not-tested-do-not-use:
Users that are interested in drafts-not-complete-not-tested-do-not-use are comparing it to the libraries listed below
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- Blog-type notes about building Onion sites☆143Updated 7 years ago
- Replicating Encrypted PasteBin☆74Updated 7 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- ☆62Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Makes generating machine-readable, digitally signed warrant canary statements simpler☆147Updated 5 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆56Updated 10 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Scripts needed to support Trackography project☆73Updated 9 years ago
- Suite of installers for the LetsEncrypt official client on every major *nix OS (Debian, Amazon Linux, CentOS, RedHat, Ubuntu, FreeBSD)☆79Updated 6 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- An Ansible role for using tor!☆73Updated 9 years ago
- Jump to Full Encryption☆61Updated 8 years ago
- Command-line utility to control Tor.☆89Updated last year
- Subgraph Application Firewall☆105Updated 6 years ago
- Hardened kernel generation - Deprecated☆47Updated 7 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Automated OpenSSH hardening☆43Updated 7 years ago