dfd-tud / deda
☆2,120Updated 7 months ago
Alternatives and similar repositories for deda:
Users that are interested in deda are comparing it to the libraries listed below
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆699Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆4,038Updated this week
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,351Updated last month
- SSH tarpit that slowly sends an endless banner☆7,907Updated 10 months ago
- Paper backup generator suitable for long-term storage.☆1,279Updated this week
- Librefox: Firefox with privacy enhancements☆1,755Updated 4 years ago
- The archivist's web crawler: WARC output, dashboard for all crawls, dynamic ignore patterns☆1,475Updated 9 months ago
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,071Updated this week
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,516Updated last year
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,509Updated this week
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆360Updated 12 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,429Updated 9 months ago
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆534Updated 4 years ago
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆509Updated last year
- Privacy Possum makes tracking you less profitable☆766Updated 2 years ago
- 3D reproduction of TSA Master keys☆3,169Updated 2 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆595Updated last month
- Key and Lock Decoding Tools☆1,137Updated 4 years ago
- Promoting Solutions that Improve Wellbeing, Freedom and Society☆3,044Updated 2 years ago
- Export messages from Signal Desktop☆373Updated 3 months ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,011Updated 10 months ago
- An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity☆1,625Updated 6 months ago
- AdNauseam: Fight back against advertising surveillance☆4,748Updated 2 weeks ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,921Updated 2 years ago
- Redirect `.idk` domains using Wikipedia☆1,527Updated 11 months ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,262Updated last month
- Block spying and tracking on Windows☆4,814Updated 2 months ago
- Indicators of Compromise from Amnesty International's cyber investigations☆1,590Updated 4 months ago
- ☆4,859Updated 2 weeks ago
- A dead simple tool to sign files and verify digital signatures.☆2,344Updated last month