drduh / prism
PRISM is an user space stealth reverse shell backdoor, written in pure C.
☆18Updated 8 years ago
Alternatives and similar repositories for prism:
Users that are interested in prism are comparing it to the libraries listed below
- A collection of category-specific host files☆14Updated 2 months ago
- Shared lists of problem domains people may want to block with hosts files☆16Updated 2 months ago
- Checklist for securing communications☆37Updated 5 years ago
- Configuration files and scripts used in guides and for system setup.☆309Updated last week
- HOWTO: Firejailed Tor Browser☆29Updated 5 months ago
- DNSSEC-monitoring tools used many TLDs☆31Updated 6 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- Guide to building a Linux or BSD router on the PC Engines APU platform☆171Updated 8 months ago
- A FOSS hackers guide to the CLI, privacy, security, self hosting, and the internet.☆68Updated last year
- Hacker OPSEC☆96Updated 7 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆194Updated last week
- An awesome list for all the awesome stuff I do. 🕶️☆29Updated last year
- dynamic nested VPN chains in Linux☆34Updated 5 years ago
- Qubes component: app-linux-pdf-converter☆56Updated 3 months ago
- Collected and authored guides for personal and operational security.☆60Updated 2 years ago
- The scripts and configuration that run XMPP.is☆11Updated last month
- Python program for creating static HTML image galleries☆21Updated 9 years ago
- Every document published from the Snowden archive☆68Updated 10 years ago
- The codebase deployed at https://xray.ddosecrets.com/☆10Updated 4 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆34Updated 6 years ago
- Guide to using a remote Debian server for security and privacy services☆448Updated 5 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆49Updated 3 months ago
- Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and s…☆47Updated 2 years ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆57Updated last month
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Qubes Builder☆86Updated 5 months ago
- USB armory Debian base image☆79Updated last month
- The "hunter2" password manager is a simple script-oriented password manager.☆15Updated 5 years ago
- Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.☆49Updated 3 years ago
- opmsg p2p transport network☆71Updated 6 years ago