essandess / isp-data-pollutionLinks
ISP Data Pollution to Protect Private Browsing History with Obfuscation
☆607Updated 2 years ago
Alternatives and similar repositories for isp-data-pollution
Users that are interested in isp-data-pollution are comparing it to the libraries listed below
Sorting:
- Take back your privacy. Lose yourself in the haystack.☆563Updated 7 months ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆130Updated 8 years ago
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆510Updated 5 months ago
- Metadata Anonymisation Toolkit☆100Updated 5 years ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,284Updated 3 months ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆707Updated last year
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 7 years ago
- Implementation for the paper: Horcrux, A Password Manager for Paranoids. This code is a research prototype to explore password manager de…☆89Updated 8 years ago
- Leak Protection (Fail Safe Mechanism) for (Open)VPN☆174Updated 6 years ago
- KeePass 2 database master-password cracker☆133Updated 7 years ago
- Simple random DNS, HTTP/S internet traffic noise generator☆1,739Updated last year
- Prevent user profiling via mouse tracking.☆55Updated 4 years ago
- Pollute your web history so it's worthless to buyers☆63Updated 4 years ago
- Configures a tor client's ExcludeExitNodes torrc option to avoid exit relays without ContactInfo☆13Updated 4 years ago
- Snowden Archive: The SIDtoday Files☆409Updated 6 years ago
- OONI Probe network measurement tool for detecting internet censorship☆816Updated 8 months ago
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆542Updated 5 years ago
- Snowden's toolkit — for the Rest of Us.☆72Updated 6 years ago
- cryptostorm client configs☆197Updated 4 months ago
- Data flow in the Tor network☆532Updated 7 years ago
- Remote administration service which uses twitter as a command and control server☆715Updated 4 years ago
- A basic tool for pushing a web page to multiple archiving services at once.☆216Updated last year
- An artware browser add-on to protect privacy in web-search. By issuing randomized queries to common search-engines, TrackMeNot obfuscates…☆390Updated 3 years ago
- An all-inclusive Tor configuration for Raspberry Pi, serves as both a relay and personal Tor network☆113Updated 7 years ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆679Updated 6 years ago
- Guide to using a remote Debian server for security and privacy services☆449Updated 5 years ago
- Python script to monitor services, dispatch SMS on fail, and attempt restart.☆121Updated 8 years ago
- Turn images into sounds viewable on a spectrogram!☆160Updated 5 years ago
- Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark☆778Updated 2 years ago
- An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber☆988Updated 8 years ago