subgraph / gnome-shell-extension-torstatus
GNOME Shell aggregate system menu Tor indicator.
☆5Updated 7 years ago
Alternatives and similar repositories for gnome-shell-extension-torstatus:
Users that are interested in gnome-shell-extension-torstatus are comparing it to the libraries listed below
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- Command-line utility to control Tor.☆89Updated last year
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Install script for grsecurity for Debian environments☆58Updated 9 years ago
- Prosody module that suggest users to enable OTR (not mandatory)☆40Updated 3 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Updated 9 years ago
- Subgraph OS issues repository☆73Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- security in a box - tools and tactics for your digital security☆19Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆79Updated last week
- ☆62Updated 10 years ago
- The Digital First Aid Kit has moved to Gitlab:☆109Updated 5 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- ☆25Updated 7 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆16Updated 9 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆12Updated 8 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- ☆15Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- Subgraph Application Firewall☆105Updated 6 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Simple detector of ARP poisoning attack☆28Updated 9 years ago
- ☆17Updated 7 years ago