☆2,445Sep 15, 2024Updated last year
Alternatives and similar repositories for deda
Users that are interested in deda are comparing it to the libraries listed below
Sorting:
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,915May 28, 2024Updated last year
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,995Mar 11, 2026Updated last week
- Rust tool to detect cell site simulators on an orbic mobile hotspot☆4,993Updated this week
- get things from one computer to another, safely☆22,432Updated this week
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆5,275Updated this week
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,275Updated this week
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- 🗃 Open source self-hosted web archiving. Takes URLs/browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and mor…☆27,093Updated this week
- Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.☆12,816Jul 9, 2024Updated last year
- Never ever ever use pixelation as a redaction technique☆8,267Mar 15, 2024Updated 2 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,292Dec 19, 2025Updated 3 months ago
- An open Apple AirDrop implementation written in Python☆9,539Jun 11, 2024Updated last year
- Domain blocklist covering manually spotted trackers, marketing bullshit, abusive domains, telemetry and other nuisances.☆12Sep 20, 2021Updated 4 years ago
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆21,674Feb 2, 2026Updated last month
- Admin Dashboard for PiRouter☆43Feb 9, 2018Updated 8 years ago
- 3D reproduction of TSA Master keys☆3,240May 25, 2022Updated 3 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,572Mar 1, 2024Updated 2 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,400Oct 15, 2025Updated 5 months ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆52,887Updated this week
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,234Updated this week
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆19Apr 4, 2021Updated 4 years ago
- SSH tarpit that slowly sends an endless banner☆8,418Jun 3, 2024Updated last year
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆4,397Apr 16, 2025Updated 11 months ago
- Ghidra is a software reverse engineering (SRE) framework☆65,820Updated this week
- ☆6,270Mar 8, 2026Updated last week
- The single instruction C compiler☆10,157May 29, 2024Updated last year
- An open source, self-hosted implementation of the Tailscale control server☆36,625Updated this week
- signal-cli provides an unofficial commandline, JSON-RPC and dbus interface for the Signal messenger.☆4,321Mar 13, 2026Updated last week
- Google Chromium, sans integration with Google☆26,034Mar 14, 2026Updated last week
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops, workstations…☆1,532Mar 14, 2026Updated last week
- rga: ripgrep, but also search in PDFs, E-Books, Office documents, zip, tar.gz, etc.☆9,522Mar 1, 2026Updated 2 weeks ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,606Apr 18, 2024Updated last year
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,443Updated this week
- Set up a personal VPN in the cloud☆30,330Updated this week
- Official git repo for iodine dns tunnel☆7,743Sep 4, 2025Updated 6 months ago
- THIS REPO IS NOT MAINTAINED ANYMORE. Please see https://codeberg.org/tenacityteam/tenacity for Tenacity, which is maintained.☆6,652Jun 29, 2022Updated 3 years ago
- Wrangling Untrusted File Formats Safely☆4,716Mar 2, 2026Updated 2 weeks ago
- A Chrome browser extension that blocks common browser fingerprint techniques to improve your privacy.☆26Nov 3, 2022Updated 3 years ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,369Updated this week