☆2,465Sep 15, 2024Updated last year
Alternatives and similar repositories for deda
Users that are interested in deda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,943May 28, 2024Updated last year
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,625Apr 17, 2026Updated last month
- Rust tool to detect cell site simulators on an orbic mobile hotspot☆5,212Updated this week
- get things from one computer to another, safely☆22,607May 13, 2026Updated last week
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆5,429May 13, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,318Updated this week
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- 🗃 Open source self-hosted web archiving. Takes URLs/browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and mor…☆27,478Updated this week
- Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.☆12,939Jul 9, 2024Updated last year
- Never ever ever use pixelation as a redaction technique☆8,301Mar 15, 2024Updated 2 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,404Dec 19, 2025Updated 5 months ago
- An open Apple AirDrop implementation written in Python☆9,625Jun 11, 2024Updated last year
- Domain blocklist covering manually spotted trackers, marketing bullshit, abusive domains, telemetry and other nuisances.☆12Sep 20, 2021Updated 4 years ago
- Admin Dashboard for PiRouter☆43Feb 9, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆22,330Mar 20, 2026Updated 2 months ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,404Oct 15, 2025Updated 7 months ago
- 3D reproduction of TSA Master keys☆3,239May 25, 2022Updated 3 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,588Mar 1, 2024Updated 2 years ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,605Updated this week
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,397May 12, 2026Updated last week
- Ghidra is a software reverse engineering (SRE) framework☆68,594May 13, 2026Updated last week
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆19Apr 4, 2021Updated 5 years ago
- SSH tarpit that slowly sends an endless banner☆8,455Jun 3, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆4,528Apr 14, 2026Updated last month
- ☆6,423May 1, 2026Updated 2 weeks ago
- A tool to detect whether a PDF has a bad redaction☆801May 3, 2026Updated 2 weeks ago
- The single instruction C compiler☆10,181May 29, 2024Updated last year
- An open source, self-hosted implementation of the Tailscale control server☆38,349May 13, 2026Updated last week
- Google Chromium, sans integration with Google☆26,630May 13, 2026Updated last week
- signal-cli provides an unofficial commandline, JSON-RPC and dbus interface for the Signal messenger.☆4,562May 13, 2026Updated last week
- rga: ripgrep, but also search in PDFs, E-Books, Office documents, zip, tar.gz, etc.☆9,618Mar 25, 2026Updated last month
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,635Apr 18, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops, workstations…☆1,559Updated this week
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,496May 10, 2026Updated last week
- Set up a personal VPN in the cloud☆30,235Updated this week
- Official git repo for iodine dns tunnel☆7,863Sep 4, 2025Updated 8 months ago
- THIS REPO IS NOT MAINTAINED ANYMORE. Please see https://codeberg.org/tenacityteam/tenacity for Tenacity, which is maintained.☆6,639Jun 29, 2022Updated 3 years ago
- Wrangling Untrusted File Formats Safely☆4,745May 11, 2026Updated last week
- A Chrome browser extension that blocks common browser fingerprint techniques to improve your privacy.☆26Nov 3, 2022Updated 3 years ago