This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script removes them to make your experience better and more secure. Also, the script installs an additional software for the protection. You will find more advices in Readme file about "what you can do more".
☆101Feb 11, 2022Updated 4 years ago
Alternatives and similar repositories for Ubuntu-Telemetry-Free-Privacy-Secure
Users that are interested in Ubuntu-Telemetry-Free-Privacy-Secure are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Library of bash scripts that allow to harden security of Linux workstation and fingerprint essential files☆21Feb 27, 2012Updated 14 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆40Mar 10, 2025Updated last year
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- ☆14Sep 1, 2017Updated 8 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Swiss army knife for (web) security specialists.☆12Dec 13, 2017Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Jun 30, 2018Updated 7 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- [deprecated] small Firefox extension turning Firefox into a bridge for censored users in countries with oppressive regimes☆32Apr 23, 2020Updated 5 years ago
- VOIP Security Audit Framework☆109Jan 22, 2018Updated 8 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 3 months ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- #7DaysOfCode Challenge. Next step #100DaysOfCode☆11May 1, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- source of: https://www.unknowncheats.me/forum/grand-theft-auto-v/300630-onra2s-mini-external-cheat-billion-dollar-earnings-godmode-etc-gt…☆11Jul 22, 2019Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- receive and draw primitives with SwapBuffers hook and imgui☆12Oct 15, 2020Updated 5 years ago
- Smoking Linux Every Day!☆56Jul 18, 2020Updated 5 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- DefCon24☆122Sep 2, 2016Updated 9 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆177Sep 2, 2020Updated 5 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- ☆11Aug 19, 2017Updated 8 years ago