fhstp / SoniControlLinks
SoniControl - the first ultrasonic firewall
☆91Updated last year
Alternatives and similar repositories for SoniControl
Users that are interested in SoniControl are comparing it to the libraries listed below
Sorting:
- Mobile sensor to collect data useful in detecting use of IMSI catcher ("Stingray") devices. Loosely based on Project Seaglass from UWashi…☆30Updated 4 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆63Updated 4 years ago
- Get Your 3D Printed High Security Key☆142Updated 3 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 6 months ago
- AICDL collector services and modules☆45Updated 8 years ago
- Source to www.draw.io☆99Updated 6 years ago
- Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe☆85Updated 4 years ago
- Tooling to retrieve data from Axon2 Body Cams☆45Updated 4 years ago
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- Firmware and Software suite for the Hyperspace wireless, location-based mesh network.☆117Updated 3 years ago
- A light version of Tor portable to the browser☆120Updated 4 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- ☆37Updated 3 years ago
- Web on top of any protocol☆114Updated 5 years ago
- Cryptsetup with Deniable LUKS header crypto extension 🇺🇦 SUPPORT UKRAINE! 🇺🇦☆64Updated 5 years ago
- Tor traffic whitelisting gateway☆72Updated last month
- ☆287Updated 9 years ago
- Tool to verify DKIM signatures on an mbox of emails☆95Updated 6 years ago
- Spawn shells anywhere. Fully peer-to-peer, authenticated, and end to end encrypted☆251Updated last year
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 3 years ago
- ☆146Updated 4 years ago
- Sanitize documents to safe PDFs, for active content removal☆39Updated last month
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆106Updated 9 months ago
- Easily create Tor hidden services with one command.☆57Updated 8 years ago
- Notes on entropy and complexity☆20Updated 3 years ago
- A FOSS hackers guide to the CLI, privacy, security, self hosting, and the internet.☆69Updated 2 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 2 months ago
- Grassland Node Lite. Optimized for use on low-end computers. Requires Grassland's 'Node Lite Object Detection'☆64Updated 2 years ago
- Identity Based Network API with 256-Bit Addresses☆139Updated 5 months ago
- generate pgp keys with vanity fingerprints☆18Updated 8 years ago