butteff / Ubuntu-Telemetry-Free-Privacy-SecureLinks
This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script removes them to make your experience better and more secure. Also, the script installs an additional software for the protection. You will find more advices in Readme file about "what you can do more".
☆101Updated 3 years ago
Alternatives and similar repositories for Ubuntu-Telemetry-Free-Privacy-Secure
Users that are interested in Ubuntu-Telemetry-Free-Privacy-Secure are comparing it to the libraries listed below
Sorting:
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆66Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Smoking Linux Every Day!☆55Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆254Updated 2 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆84Updated 5 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆336Updated 8 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- Reveal encrypted files stored on a filesystem.☆54Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Updated 7 months ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- docker based telnet honeypot☆80Updated 7 years ago