srlabs / blue-merleLinks
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
☆272Updated 3 weeks ago
Alternatives and similar repositories for blue-merle
Users that are interested in blue-merle are comparing it to the libraries listed below
Sorting:
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆225Updated 2 months ago
- its like a tricorder, for your wireless world.☆92Updated last year
- Reverse engineered TETRA cryptographic primitives☆189Updated last year
- Enabling Geographically Decoupled Measurements in Cellular Networks☆60Updated 2 weeks ago
- List of useful things☆67Updated this week
- A software SIM card.☆342Updated 11 months ago
- OS image for the PiRogue based on Debian 12☆159Updated 11 months ago
- Log ALPR data using a Motorola vulnerability☆80Updated 5 months ago
- ☆522Updated 6 months ago
- Scans for BLE devices and if it see any from Taser International sets an home assistant switch to 'on', turns back off a minute after the…☆134Updated 11 months ago
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆182Updated 2 months ago
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆170Updated 2 years ago
- ☆267Updated 2 years ago
- Silent SMS ping and detector☆102Updated last year
- Indicators of stalkerware apps☆315Updated 2 weeks ago
- A tool to test SIM card security☆123Updated 2 years ago
- Wireless Hacking Devices Protocol client☆205Updated this week
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆138Updated last year
- ☆64Updated last year
- 📡 SPR: Open Source, secure, user friendly and fast wifi routers for your home. One wifi password per device. Ad Blocking & Privacy Block…☆242Updated last week
- DoHoT: making practical use of DNS over HTTPS over Tor☆258Updated 3 years ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆121Updated 3 weeks ago
- A sniffer for Bluetooth 5 and 4.x LE☆96Updated 6 months ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆299Updated 3 months ago
- TorBox is an easy to use, anonymizing router based on Raspberry Pi, which also runs on Debian and Ubuntu based systems.☆292Updated this week
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- its like a tricorder, for your wireless world.☆111Updated last year
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆54Updated 5 months ago
- Few tools for a Tor relay.☆56Updated last week
- ✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberr…☆214Updated last year