This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script removes them to make your experience better and more secure. Also, the script installs an additional software for the protection. You will find more advices in Readme file about "what you can do more".
☆102Feb 11, 2022Updated 4 years ago
Alternatives and similar repositories for Ubuntu-Telemetry-Free-Privacy-Secure
Users that are interested in Ubuntu-Telemetry-Free-Privacy-Secure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Library of bash scripts that allow to harden security of Linux workstation and fingerprint essential files☆21Mar 25, 2026Updated 2 weeks ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆40Mar 10, 2025Updated last year
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 4 years ago
- ☆14Sep 1, 2017Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Sep 20, 2017Updated 8 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Swiss army knife for (web) security specialists.☆12Dec 13, 2017Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 9 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- analyze a web-based network traffic 🕶 to detect central command and control servers☆81Jun 30, 2018Updated 7 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- [deprecated] small Firefox extension turning Firefox into a bridge for censored users in countries with oppressive regimes☆32Apr 23, 2020Updated 5 years ago
- VOIP Security Audit Framework☆109Jan 22, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- windows kernel vulnerability found by me☆89Aug 28, 2017Updated 8 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 3 months ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- An experiment in fingerprint-free encrypted messaging☆33Jun 1, 2015Updated 10 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Steam, Dota, CSGO, TF2, PUBG Scam Site Filter list☆12Jun 23, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Smoking Linux Every Day!☆56Jul 18, 2020Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆175Sep 2, 2020Updated 5 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- ☆11Aug 19, 2017Updated 8 years ago