butteff / Ubuntu-Telemetry-Free-Privacy-SecureLinks
This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script removes them to make your experience better and more secure. Also, the script installs an additional software for the protection. You will find more advices in Readme file about "what you can do more".
☆101Updated 3 years ago
Alternatives and similar repositories for Ubuntu-Telemetry-Free-Privacy-Secure
Users that are interested in Ubuntu-Telemetry-Free-Privacy-Secure are comparing it to the libraries listed below
Sorting:
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆254Updated 2 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆66Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆84Updated 6 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆202Updated 9 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆79Updated 7 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago