jubalh / MATLinks
Metadata Anonymisation Toolkit
☆114Updated 6 years ago
Alternatives and similar repositories for MAT
Users that are interested in MAT are comparing it to the libraries listed below
Sorting:
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆252Updated 3 months ago
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆511Updated 9 months ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆129Updated 8 years ago
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆126Updated 5 years ago
- Tool to prevent eavesdropping and ultrasonic access of your smart phone.☆143Updated last year
- ☆21Updated last year
- Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely force…☆123Updated 5 years ago
- KeePass 2 database master-password cracker☆134Updated 7 years ago
- Tor-based proxy for linux☆65Updated 5 years ago
- This is an unofficial repository, for the official repository visit: https://git.anonymousmessenger.ly/dx/AnonymousMessenger☆82Updated 2 years ago
- a more secure way to force programs to exclusively use tor network☆206Updated 3 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆88Updated 5 months ago
- Tampermonkey script that encrypt and decrypt your messages on Discord☆92Updated 6 years ago
- If you want know, who use your computer when you are not nearby!☆48Updated 4 years ago
- 🛡️ Anonymous F2F network based on the QB-problem & GP/12 protocol stack. Uses post-quantum cryptographic algorithms: ML-KEM, ML-DSA☆176Updated last week
- Some useful tools for I2P☆143Updated 3 months ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆198Updated last year
- Prevent user profiling via mouse tracking.☆54Updated 4 years ago
- Configures a tor client's ExcludeExitNodes torrc option to avoid exit relays without ContactInfo☆13Updated 4 years ago
- The legendary netstalking NEtwork SCAnner☆213Updated 7 years ago
- Instructions for setting up DNS over TLS over TOR☆149Updated 5 years ago
- Fancy I2P address generator☆34Updated 6 years ago
- Scans all nearby wifi networks and the devices connected to each network for Indoor positioning☆124Updated 5 years ago
- 🎲 A curated list of awesome services for obtaining random results.☆47Updated 2 years ago
- Data collected from publicly available sources to be used in an intelligence context☆148Updated 6 years ago
- Гайд по нетсталкингу☆90Updated 4 years ago
- Android app that listens for incoming SMS text/data messages and conditionally sends an automatic reply containing GPS location data.☆73Updated 5 years ago
- This async script is designed to get proxies from several sites and save it to a file.☆28Updated 4 years ago
- Take back your privacy. Lose yourself in the haystack.☆561Updated 10 months ago
- Scramb.py is a region based JPEG Image Scrambler and Descrambler written in Python for End-to-End-Encrypted (E2EE) Image distribution thr…☆59Updated 3 years ago