hardenedlinux / security-chainLinks
This is not the cyber you ever expected....did I just say cyyyberrrr....
☆15Updated 6 years ago
Alternatives and similar repositories for security-chain
Users that are interested in security-chain are comparing it to the libraries listed below
Sorting:
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- Tear the firmware apart with your bare hands;-)☆191Updated 2 months ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Platform Firmware Auditing Tool☆131Updated 7 years ago
- A USB layer firewall for the Linux kernel☆35Updated 7 years ago
- External plugins for examples, experimental, and some legacy code.☆43Updated 3 weeks ago
- Command-line utility to control Tor.☆89Updated last year
- Debian GNU/Linux based Services Profiles☆242Updated 3 years ago
- hardenedlinux.org website☆32Updated 5 months ago
- A tool for parsing common ACPI tables☆14Updated 5 years ago
- Hardware project of the Nitrokey Storage device☆39Updated last year
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- opmsg p2p transport network☆73Updated 7 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 6 months ago
- USB armory - hardware control tool☆32Updated 2 months ago
- ☆29Updated 6 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials☆68Updated 5 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- Wireshark dissector (written in Lua) for dissecting the WireGuard tunneling protocol.☆49Updated 7 years ago
- ☆45Updated 7 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- The web site☆14Updated 2 years ago
- Reseed data management tools for I2P☆37Updated 8 months ago
- Retrieve Intel AMT's Audit Log from a Linux machine without knowing the admin user's password.☆49Updated 4 years ago
- ☆12Updated 2 months ago
- sign elf binaries with GPG☆17Updated 9 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago