psal / anonymouth
☆1,924Updated 3 years ago
Related projects: ⓘ
- Anonymous peer-to-peer instant messaging☆3,696Updated 2 years ago
- Shared lists of problem domains people may want to block with hosts files☆4,535Updated 5 months ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,409Updated 6 months ago
- GitHub repository for the SecureDrop whistleblower platform. Do not submit tips here!☆3,600Updated last week
- Private messaging system that hides metadata☆2,468Updated 5 years ago
- 🔑🔥📈 Next Level PGP☆3,476Updated 5 years ago
- An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.☆5,170Updated this week
- A blockchain-based DNS + HTTP server that fixes HTTPS security, and more!☆1,735Updated 7 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,919Updated 7 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆665Updated 7 months ago
- Secure chat software for your computer.☆1,090Updated 5 years ago
- A collection of interesting new networks and tech aiming at decentralisation (in some form).☆5,224Updated this week
- ultrafast single TCP packet audio/visual experience☆1,394Updated last month
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆904Updated 7 years ago
- Tweets metadata scraper & activity analyzer☆2,944Updated 10 months ago
- Home of the Cicada Direct Democracy and Dapp Platform☆763Updated 5 years ago
- Tool for partial deblobbing of Intel ME/TXE firmware images☆4,459Updated 3 months ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,191Updated last month
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆3,913Updated 2 years ago
- A demo of overriding what's in a person's clipboard☆1,424Updated 8 months ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,763Updated last month
- Useful IT policies☆4,888Updated 7 months ago
- Using speech-to-text to fully check out during con calls☆2,096Updated 5 years ago
- A pocket-sized implementation of Bitcoin☆1,450Updated 3 years ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,350Updated 7 years ago
- Data Selfie - a browser extension to track yourself on Facebook and analyze your data.☆1,022Updated 6 years ago
- Automate Tinder swiping and introductions with Eigenfaces and StanfordNLP. NOTE: support for this project has been sunset, and the origin…☆1,934Updated 5 years ago
- A simple demo of phishing by abusing the browser autofill feature☆1,471Updated 3 years ago
- WarBerryPi - Tactical Exploitation☆2,218Updated 4 years ago
- a set of tools to help with securely redacting and stripping metadata from documents before publishing☆530Updated 4 years ago