rimerosolutions / entrusted
Sanitize documents to safe PDFs, for active content removal
☆37Updated this week
Alternatives and similar repositories for entrusted:
Users that are interested in entrusted are comparing it to the libraries listed below
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆48Updated 3 months ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆11Updated last week
- Tirdad kernel module for random ISN generation☆25Updated 6 months ago
- a framework for traffic analysis defenses☆79Updated last week
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 10 months ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆51Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆49Updated 2 months ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 4 years ago
- Paused mirror. Official repository at https://git.glasklar.is/system-transparency/core/stboot☆111Updated last year
- pam-authramp | The AuthRamp PAM module provides an account lockout mechanism based on the number of authentication failures.☆38Updated 8 months ago
- Anon pastebin☆66Updated 4 months ago
- Linux kernel module to fight against police terror☆28Updated 3 years ago
- An I2P based OS made for security☆10Updated 2 months ago
- ☆81Updated last year
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆56Updated last week
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 7 months ago
- A web app that hides secrets in plain sight securely in images with the help of AES encryption and LSB steganography technique.☆74Updated 5 months ago
- A tool for running an application in an isolated network namespace, with external network access only through a SOCKS proxy.☆22Updated 5 months ago
- a fully in-browser tool to encrypt data with the age encryption tool.☆54Updated 2 months ago
- A WASM package and web app for encrypting and decrypting age-encrypted files, powered by rage.☆84Updated 2 years ago
- Age plugin to split keys and wrap them with different recipients using Shamir's Secret Sharing.☆35Updated 4 months ago
- trustor (PoC)☆25Updated 3 years ago
- A guide to downloading all public DDoSecrets releases via torrent☆52Updated last year
- filter net requests according to source, destination and type☆18Updated 8 months ago
- Command-line tool to run Windows apps with Wine and bwrap/bubblewrap isolation on Linux☆104Updated last week
- BusKill kill cord for Linux☆36Updated 4 years ago
- Force the traffic of a Firefox container tab to pass through VPN or Tor network☆66Updated last year
- OnionComms is a repository of script to run an onion server and guides to configure client side applications to connect to any onion serv…☆14Updated 3 years ago
- Anti-forensic and secure messenger☆41Updated this week