openspace42 / LibreFibreLinks
The future of the decentralized internet begins with the community [L0]
☆10Updated 7 years ago
Alternatives and similar repositories for LibreFibre
Users that are interested in LibreFibre are comparing it to the libraries listed below
Sorting:
- Tor traffic whitelisting gateway☆73Updated 4 months ago
- CLIP OS toolkit (cosmk)☆16Updated 3 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Updated 10 months ago
- Scan for subdomains using bruteforcing techniques☆47Updated last year
- Shodan Firefox Add-on☆153Updated 4 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Updated 6 years ago
- Tight Firejail profiles☆145Updated 6 years ago
- BlackArch configuration for the bash shell.☆13Updated 4 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Liberté Linux, a live distribution serving as a communication aid in hostile environments.☆80Updated 9 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆116Updated last year
- Demonsaw Source Code☆124Updated 3 years ago
- A collection of boobie traps designed to detect malicious mischief and respond appropriately.☆15Updated 8 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- qubes rpm for i3☆32Updated 2 months ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆88Updated 3 years ago
- Web of trust grapher☆38Updated 2 months ago
- stuff to generate the pentoo livecd☆24Updated last year
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- SaltStack formula to set up my personal Qubes OS configuration☆19Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- BlackArch Linux Keyring☆22Updated 6 years ago
- Truehunter☆31Updated 4 years ago
- a more secure way to force programs to exclusively use tor network☆202Updated 3 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆152Updated 5 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago