subgraph / usblockoutLinks
USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.
☆55Updated 7 years ago
Alternatives and similar repositories for usblockout
Users that are interested in usblockout are comparing it to the libraries listed below
Sorting:
- Subgraph Application Firewall☆106Updated 6 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- macouflage is a MAC address anonymization tool, written in Golang, for Linux-based operating systems.☆119Updated 2 years ago
- Go seccomp parser and compiler☆53Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- video onion hackery (osx scripts)☆20Updated 8 years ago
- ☆56Updated 8 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- LD_PRELOAD hack to redirect connections to other ports☆43Updated 9 years ago
- TLS - what can go wrong?☆108Updated 6 years ago
- Install script for grsecurity for Debian environments☆60Updated 9 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 10 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆106Updated 4 years ago
- Blockfinder enumerates network information for countries☆128Updated 2 years ago
- Website privacy checker☆27Updated 9 years ago
- Command-line utility to control Tor.☆89Updated last year
- Go HTTP Strict Transport Security library☆22Updated 9 months ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- framework for a high interaction SSH honeypot☆38Updated 5 years ago
- Tor Control Port Filter and State Tracker Daemon☆26Updated 7 years ago
- ☆30Updated 10 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago