☆2,446Sep 15, 2024Updated last year
Alternatives and similar repositories for deda
Users that are interested in deda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,925May 28, 2024Updated last year
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,182Mar 11, 2026Updated 3 weeks ago
- Rust tool to detect cell site simulators on an orbic mobile hotspot☆5,080Apr 1, 2026Updated last week
- get things from one computer to another, safely☆22,500Mar 17, 2026Updated 3 weeks ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆5,326Mar 31, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,290Updated this week
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- 🗃 Open source self-hosted web archiving. Takes URLs/browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and mor…☆27,159Apr 2, 2026Updated last week
- Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.☆12,842Jul 9, 2024Updated last year
- Never ever ever use pixelation as a redaction technique☆8,290Mar 15, 2024Updated 2 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,342Dec 19, 2025Updated 3 months ago
- An open Apple AirDrop implementation written in Python☆9,580Jun 11, 2024Updated last year
- Domain blocklist covering manually spotted trackers, marketing bullshit, abusive domains, telemetry and other nuisances.☆12Sep 20, 2021Updated 4 years ago
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆21,908Mar 20, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Admin Dashboard for PiRouter☆43Feb 9, 2018Updated 8 years ago
- 3D reproduction of TSA Master keys☆3,238May 25, 2022Updated 3 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,578Mar 1, 2024Updated 2 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,401Oct 15, 2025Updated 5 months ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,086Apr 2, 2026Updated last week
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,266Updated this week
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆19Apr 4, 2021Updated 5 years ago
- SSH tarpit that slowly sends an endless banner☆8,433Jun 3, 2024Updated last year
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆4,509Apr 16, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ghidra is a software reverse engineering (SRE) framework☆66,637Updated this week
- ☆6,306Mar 28, 2026Updated last week
- The single instruction C compiler☆10,160May 29, 2024Updated last year
- A tool to detect whether a PDF has a bad redaction☆796Apr 2, 2026Updated last week
- An open source, self-hosted implementation of the Tailscale control server☆37,255Updated this week
- Google Chromium, sans integration with Google☆26,173Apr 1, 2026Updated last week
- signal-cli provides an unofficial commandline, JSON-RPC and dbus interface for the Signal messenger.☆4,389Apr 3, 2026Updated last week
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops, workstations…☆1,542Mar 27, 2026Updated 2 weeks ago
- rga: ripgrep, but also search in PDFs, E-Books, Office documents, zip, tar.gz, etc.☆9,554Mar 25, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,620Apr 18, 2024Updated last year
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,473Updated this week
- Set up a personal VPN in the cloud☆30,336Updated this week
- Official git repo for iodine dns tunnel☆7,789Sep 4, 2025Updated 7 months ago
- THIS REPO IS NOT MAINTAINED ANYMORE. Please see https://codeberg.org/tenacityteam/tenacity for Tenacity, which is maintained.☆6,647Jun 29, 2022Updated 3 years ago
- Wrangling Untrusted File Formats Safely☆4,722Apr 1, 2026Updated last week
- A Chrome browser extension that blocks common browser fingerprint techniques to improve your privacy.☆26Nov 3, 2022Updated 3 years ago