srlabs / blue-merle
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
☆194Updated last month
Related projects ⓘ
Alternatives and complementary repositories for blue-merle
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆157Updated 3 months ago
- OS image for the PiRogue based on Debian 12☆154Updated 4 months ago
- Indicators of stalkerware apps☆263Updated 3 weeks ago
- its like a tricorder, for your wireless world.☆81Updated 9 months ago
- Vanguards help guard you from getting vanned...☆219Updated 4 months ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆45Updated last month
- Use dropbear over wireguard.☆288Updated 3 months ago
- 📡 SPR: Open Source, secure, user friendly and fast wifi routers for your home. One wifi password per device. Ad Blocking & Privacy Block…☆194Updated this week
- Python client for Nitrokey devices☆103Updated this week
- Scans for BLE devices and if it see any from Taser International sets an home assistant switch to 'on', turns back off a minute after the…☆128Updated 4 months ago
- code to be able to use multiple esp32 to simulatnaiously scan for wifi networks across multiple other esp32☆15Updated 7 months ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆272Updated last year
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces…☆38Updated last month
- Work in Progress: A messenger bridge between Threema and Matrix.☆106Updated 8 months ago
- This is a short description of some of the knowledge I've collected on GrapheneOS and some common questions I've been asked and my answer…☆77Updated 2 years ago
- Multi-headed 802.11 panopticon☆187Updated last year
- ☆90Updated 10 months ago
- Few tools for a Tor relay.☆45Updated last month
- Silent SMS ping and detector☆74Updated last year
- Graphical application to manage and use Nitrokey 3 devices☆85Updated this week
- Install, run, and update apps without root and only in your home directory☆33Updated 2 years ago
- Backbone of the deSEC Free Secure DNS Hosting Service☆396Updated this week
- DoHoT: making practical use of DNS over HTTPS over Tor☆234Updated 3 years ago
- Decrypt, Modify and Reencrypt Seedvault Android Backups☆103Updated 6 months ago
- ☆511Updated last year
- Tool to find common vulnerabilities in cryptographic public keys☆256Updated 3 weeks ago
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆517Updated last week
- Enabling Geographically Decoupled Measurements in Cellular Networks☆45Updated last month
- 🔑 Raspberry Pi Encrypted Boot with Remote SSH☆194Updated 10 months ago
- Anonymous peer-to-peer instant messaging☆223Updated 3 weeks ago