eijah / demoncrypt
Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.
☆180Updated 9 years ago
Alternatives and similar repositories for demoncrypt:
Users that are interested in demoncrypt are comparing it to the libraries listed below
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 4 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- A set of scripts to root and install gapps and orbot+orwall into a CopperheadOS image and re-sign it for verified boot.☆222Updated 7 years ago
- Public File Sharing Network for Demonsaw☆18Updated 8 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆153Updated 8 years ago
- Replicating Encrypted PasteBin☆75Updated 7 years ago
- Your keys. Your privacy. Your sovereignty.☆659Updated 5 years ago
- ShadowCore integration/staging tree☆97Updated 6 years ago
- An add-on to help TOR users find hidden services for ClearNet sites they use every day☆32Updated 7 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- Decentralised Information Black Market☆202Updated 10 years ago
- INTERLOCK - file encryption and HSM front-end☆299Updated last month
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- LibOTR functionality in Irssi.☆185Updated 7 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆355Updated 9 years ago
- Pond☆910Updated 3 years ago
- THIS PROJECT IS DEPRECATED☆62Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- A Polymorphic Engine for Filtering-Resistant Transport Protocols☆287Updated 2 years ago
- Demonsaw Source Code☆122Updated 3 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆145Updated last year
- The DIME resolver library and command line utilities.☆414Updated last year
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆274Updated 9 years ago
- Double Ratchet Algorithm☆375Updated 8 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- ☆96Updated 7 years ago
- Ahmia hidden service search engine☆202Updated 2 years ago