butteff / Ubuntu-Telemetry-Free-Privacy-SecureLinks
This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script removes them to make your experience better and more secure. Also, the script installs an additional software for the protection. You will find more advices in Readme file about "what you can do more".
☆101Updated 3 years ago
Alternatives and similar repositories for Ubuntu-Telemetry-Free-Privacy-Secure
Users that are interested in Ubuntu-Telemetry-Free-Privacy-Secure are comparing it to the libraries listed below
Sorting:
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Panic button for protection against cold boot attacks☆146Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆255Updated 3 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆80Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆66Updated 6 years ago
- Script to generate malicious debian packages (debain trojans).☆120Updated 6 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Removed according to regulations☆35Updated 8 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated last week
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago