subgraph / gnome-shell-extension-torstatus
GNOME Shell aggregate system menu Tor indicator.
☆5Updated 7 years ago
Alternatives and similar repositories for gnome-shell-extension-torstatus:
Users that are interested in gnome-shell-extension-torstatus are comparing it to the libraries listed below
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Hardened kernel generation - Deprecated☆48Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- ☆62Updated 10 years ago
- ☆12Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Subgraph OS issues repository☆73Updated 8 years ago
- Command-line utility to control Tor.☆89Updated last year
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Prosody module that suggest users to enable OTR (not mandatory)☆40Updated 3 years ago
- ☆25Updated 7 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Subgraph Application Firewall☆105Updated 6 years ago
- Torbutton for Thunderbird and related *bird forks☆84Updated 5 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 10 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago