fhstp / SoniControl
SoniControl - the first ultrasonic firewall
☆90Updated last year
Alternatives and similar repositories for SoniControl:
Users that are interested in SoniControl are comparing it to the libraries listed below
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆50Updated 2 months ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆63Updated 4 years ago
- Tooling to retrieve data from Axon2 Body Cams☆45Updated 4 years ago
- A light version of Tor portable to the browser☆120Updated 4 years ago
- Web on top of any protocol☆114Updated 4 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated this week
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- Easily create Tor hidden services with one command.☆56Updated 8 years ago
- Grassland Node Lite. Optimized for use on low-end computers. Requires Grassland's 'Node Lite Object Detection'☆64Updated 2 years ago
- Mobile sensor to collect data useful in detecting use of IMSI catcher ("Stingray") devices. Loosely based on Project Seaglass from UWashi…☆30Updated 4 years ago
- Get Your 3D Printed High Security Key☆142Updated 3 years ago
- ☆283Updated 9 years ago
- Tool to verify DKIM signatures on an mbox of emails☆94Updated 6 years ago
- A document proposing the standardization of a model for warrant canaries to facilitate scalable adoption by enabling automated monitoring…☆72Updated 3 years ago
- Vanguards help guard you from getting vanned...☆222Updated 7 months ago
- A simple app which let you share file securely :)☆106Updated 2 years ago
- AICDL collector services and modules☆46Updated 7 years ago
- A fork of 'LaBrea'☆75Updated 12 years ago
- Identity Based Network API with 256-Bit Addresses☆136Updated last month
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated 2 weeks ago
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆97Updated 2 years ago
- Tor traffic whitelisting gateway☆69Updated 3 weeks ago
- An exploration to host Wikipedia in IPFS☆174Updated 2 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆105Updated 5 months ago
- Qbix Platform for powering Social Apps (http://qbix.com/platform)☆93Updated 5 months ago
- Spawn shells anywhere. Fully peer-to-peer, authenticated, and end to end encrypted☆248Updated 11 months ago
- Cryptsetup with Deniable LUKS header crypto extension 🇺🇦 SUPPORT UKRAINE! 🇺🇦☆64Updated 5 years ago
- Forbid untrusted webs to access localhost or LAN. An anti-scan protection 🛡️🏡☆74Updated 10 months ago
- the rendezvous/mailbox server for magic-wormhole clients☆170Updated 2 months ago