freedomofpress / securedrop-docs
Documentation for the SecureDrop project
☆22Updated this week
Alternatives and similar repositories for securedrop-docs:
Users that are interested in securedrop-docs are comparing it to the libraries listed below
- A generic skeleton project for quickly getting a new cisagov project started.☆15Updated this week
- ☆14Updated 2 years ago
- A collection of handy Google Apps Script code snippets☆27Updated 2 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Updated 4 years ago
- OCSP Responder monitor☆34Updated 7 months ago
- Search a list of domains on the wayback machine☆15Updated 5 years ago
- open source software for journalists to investigate all of the data in the BlueLeaks dataset☆21Updated this week
- Securely build a system Tor and optionally configure numerous high-security Onion services.☆50Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 3 weeks ago
- A guide to downloading all public DDoSecrets releases via torrent☆50Updated last year
- Qubes-based SecureDrop Journalist Workstation environment for submission handling☆148Updated this week
- Go wrapper for awslabs/certlint☆25Updated 4 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 8 months ago
- experimental threat modeling tools☆14Updated 2 years ago
- Public API client for GETTR, a "non-bias [sic] social network," designed for data archival and analysis.☆13Updated 2 years ago
- Hashpic creates an image from a MD5, SHA512, SHA3-512, Blake2b or SHAKE256 hash☆26Updated 3 weeks ago
- Antiforensic actions to secure your device if it's physically stolen from you☆15Updated 2 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 4 years ago
- For FUN! Use at your own risk. No warranties, no exceptions.☆19Updated 2 years ago
- Execute any command, cache its output and get cached output on subsequent execution☆17Updated 11 months ago
- Seamless .onion and tor-ified git remotes☆26Updated 5 years ago
- USB keyboard where keystrokes are end-to-end encrypted between the keyboard and dom0☆9Updated 6 years ago
- Web interface to mailing list archives☆13Updated 7 months ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated last month
- Docker API Wrapper over WhatsMyName OSINT Username Enumeration Tool☆13Updated last week
- Information I give to people who are moving from Twitter to Mastodon☆13Updated 2 years ago
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆29Updated 5 years ago
- Index and collection of MVT compatibile indicators of compromise.☆82Updated 3 months ago
- OFTC's IRC Services☆36Updated 4 months ago