seeess / Defcon-Tor-27
SAO/Badge for Tor at Defcon 27
☆21Updated 5 years ago
Alternatives and similar repositories for Defcon-Tor-27:
Users that are interested in Defcon-Tor-27 are comparing it to the libraries listed below
- USB key cleaner☆60Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated last month
- Code samples for the Tomu board☆81Updated 3 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆20Updated 5 months ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆43Updated 6 years ago
- generate pgp keys with vanity fingerprints☆17Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 2 months ago
- FluxN0de☆15Updated 3 years ago
- Easy creation of Tor Hidden Services☆40Updated 9 years ago
- "RansomPKP" proof of concept.☆11Updated 8 years ago
- ChipWhisperer-Lint is an open source implementation of our automated leakage detection tool.☆17Updated 6 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- people's cloud: using the ideas of botnets for good☆38Updated 7 years ago
- Motorolla Mobile Data Terminal MDT9100 interface for the BeagleBone Black☆41Updated 5 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- The noise swiss army knife☆44Updated 4 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Updated 6 years ago
- Command-line utility to control Tor.☆89Updated last year
- A super micro fun implant☆23Updated 6 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- ☆30Updated 9 years ago
- ☆36Updated 7 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago