securityinabox / siabguide
security in a box - tools and tactics for your digital security
☆19Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for siabguide
- A resource which illustrates how surveillance is being carried out around the world.☆18Updated 8 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated last year
- LevelUp project website☆32Updated 3 months ago
- Baseline organizational policies and practices☆10Updated 7 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 8 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆78Updated last month
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- ☆15Updated 6 years ago
- ☆61Updated 10 years ago
- Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to …☆64Updated last year
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆20Updated last month
- in-band opportunistic mail encryption☆9Updated 7 years ago
- Ansible recipes for deployment of secure communications systems☆43Updated 6 years ago
- Tor Browser (or Firefox) in a Qubes OS disposable, with persistent bookmarks and login credentials☆43Updated 5 months ago
- Distributed, tamper-resistant circumvention tools☆48Updated 8 years ago
- Hardened kernel generation - Deprecated☆49Updated 7 years ago
- Scripts needed to support Trackography project☆73Updated 8 years ago
- Protected E-mail Headers☆73Updated 4 years ago
- An attempt to streamline the Android hardening process from the Tor Blog.☆48Updated 8 years ago
- A list of XMPP servers available as hidden services for use with the Prosody server and mod_onions☆18Updated 5 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆17Updated last year
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- lepidopter: raspberry pi image for conducting OONI network measurements☆47Updated 5 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 7 years ago
- Prosody module that suggest users to enable OTR (not mandatory)☆40Updated 2 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆61Updated 8 years ago
- Cryptolog is a tool for anonymizing webserver logs.☆68Updated 8 years ago
- Split SSH implementation for QubesOS☆41Updated 4 years ago
- Python Certificate Transparency client☆11Updated 9 years ago