fhstp / SoniControlLinks
SoniControl - the first ultrasonic firewall
☆93Updated 2 years ago
Alternatives and similar repositories for SoniControl
Users that are interested in SoniControl are comparing it to the libraries listed below
Sorting:
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- A light version of Tor portable to the browser☆120Updated 4 years ago
- Mobile sensor to collect data useful in detecting use of IMSI catcher ("Stingray") devices. Loosely based on Project Seaglass from UWashi…☆30Updated 4 years ago
- Get Your 3D Printed High Security Key☆142Updated 3 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 8 months ago
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely force…☆119Updated 4 years ago
- Etherify - bringing the ether back to ethernet☆347Updated 3 years ago
- Tooling to retrieve data from Axon2 Body Cams☆47Updated 4 years ago
- Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe☆86Updated 4 years ago
- Easily create Tor hidden services with one command.☆57Updated 9 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 4 years ago
- Tor traffic whitelisting gateway☆73Updated 3 months ago
- ☆287Updated 9 years ago
- An investigation into Jacob Appelbaum leaving the Tor Project☆98Updated last year
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆101Updated 2 years ago
- Source to www.draw.io☆99Updated 6 years ago
- ☆37Updated 3 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆112Updated 10 months ago
- Web on top of any protocol☆113Updated 5 years ago
- Tool to verify DKIM signatures on an mbox of emails☆96Updated 7 years ago
- a more secure way to force programs to exclusively use tor network☆202Updated 3 years ago
- AICDL collector services and modules☆45Updated 8 years ago
- Cryptsetup with Deniable LUKS header crypto extension 🇺🇦 SUPPORT UKRAINE! 🇺🇦☆64Updated 5 years ago
- An exploration to host Wikipedia in IPFS☆175Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- Forbid untrusted webs to access localhost or LAN. An anti-scan protection 🛡️🏡☆76Updated last year
- Rumble allows the sharing of messages and pictures without relying on the Internet, in a Delay Tolerant Fashion following the Store-Carry…☆302Updated 7 years ago
- Vanguards help guard you from getting vanned...☆233Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year