☆2,457Sep 15, 2024Updated last year
Alternatives and similar repositories for deda
Users that are interested in deda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,931May 28, 2024Updated last year
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,548Apr 17, 2026Updated last week
- Rust tool to detect cell site simulators on an orbic mobile hotspot☆5,135Updated this week
- get things from one computer to another, safely☆22,573Apr 13, 2026Updated 2 weeks ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆5,375Apr 23, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,308Updated this week
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- 🗃 Open source self-hosted web archiving. Takes URLs/browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and mor…☆27,279Apr 24, 2026Updated last week
- Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.☆12,901Jul 9, 2024Updated last year
- Never ever ever use pixelation as a redaction technique☆8,298Mar 15, 2024Updated 2 years ago
- Universal Radio Hacker: Investigate Wireless Protocols Like A Boss☆12,387Dec 19, 2025Updated 4 months ago
- An open Apple AirDrop implementation written in Python☆9,601Jun 11, 2024Updated last year
- Domain blocklist covering manually spotted trackers, marketing bullshit, abusive domains, telemetry and other nuisances.☆12Sep 20, 2021Updated 4 years ago
- Admin Dashboard for PiRouter☆43Feb 9, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆22,119Mar 20, 2026Updated last month
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,403Oct 15, 2025Updated 6 months ago
- 3D reproduction of TSA Master keys☆3,238May 25, 2022Updated 3 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,583Mar 1, 2024Updated 2 years ago
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,332Updated this week
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,359Updated this week
- Ghidra is a software reverse engineering (SRE) framework☆67,729Apr 24, 2026Updated last week
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆19Apr 4, 2021Updated 5 years ago
- SSH tarpit that slowly sends an endless banner☆8,442Jun 3, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.☆4,521Apr 14, 2026Updated 2 weeks ago
- ☆6,359Mar 28, 2026Updated last month
- A tool to detect whether a PDF has a bad redaction☆798Apr 21, 2026Updated last week
- The single instruction C compiler☆10,172May 29, 2024Updated last year
- An open source, self-hosted implementation of the Tailscale control server☆37,913Updated this week
- Google Chromium, sans integration with Google☆26,379Apr 24, 2026Updated last week
- signal-cli provides an unofficial commandline, JSON-RPC and dbus interface for the Signal messenger.☆4,486Apr 24, 2026Updated last week
- rga: ripgrep, but also search in PDFs, E-Books, Office documents, zip, tar.gz, etc.☆9,591Mar 25, 2026Updated last month
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,628Apr 18, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops, workstations…☆1,549Apr 23, 2026Updated last week
- jq for binary formats - tool, language and decoders for working with binary and text formats☆10,486Apr 18, 2026Updated last week
- Set up a personal VPN in the cloud☆30,231Updated this week
- Official git repo for iodine dns tunnel☆7,824Sep 4, 2025Updated 7 months ago
- THIS REPO IS NOT MAINTAINED ANYMORE. Please see https://codeberg.org/tenacityteam/tenacity for Tenacity, which is maintained.☆6,641Jun 29, 2022Updated 3 years ago
- Wrangling Untrusted File Formats Safely☆4,740Updated this week
- A Chrome browser extension that blocks common browser fingerprint techniques to improve your privacy.☆26Nov 3, 2022Updated 3 years ago