tpet / mat2Links
mat2 is a metadata removal tool, supporting a wide range of commonly used file formats, written in python3: at its core, it's a library, used by an eponymous command-line interface, and a nautilus extension.
☆46Updated last year
Alternatives and similar repositories for mat2
Users that are interested in mat2 are comparing it to the libraries listed below
Sorting:
- The Privacy Spreadsheet HTML and raw CSV data☆39Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆42Updated 7 months ago
- Transform a Raspberry Pi into a relay powering the Tor Network.☆36Updated last year
- A guide to downloading all public DDoSecrets releases via torrent☆54Updated last year
- Shared server infrastructure☆63Updated this week
- BusKill kill cord for Linux☆35Updated 5 years ago
- Tool to find common vulnerabilities in cryptographic public keys☆286Updated 3 weeks ago
- ❄️ Temporarily Share Your Bandwidth☆118Updated last year
- Threema App for Desktop (Windows/macOS/Linux).☆80Updated last month
- MECSA Standalone Tool for testing the security of inbound email communications.☆29Updated 10 months ago
- Matrix guide☆33Updated 5 months ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆13Updated last month
- Sanitize documents to safe PDFs, for active content removal☆39Updated last month
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆221Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆10Updated last year
- Send and share large files effortlessly with Thunderbird Send.☆102Updated last month
- A list of resources to help me keep track of important news/studies/projects/etc. in the privacy & security world.☆39Updated 2 years ago
- The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router☆249Updated this week
- List of useful things☆67Updated this week
- Automated 🧅 Tor ❄️ Snowflake Proxy (any Linux device). Run install.sh and you have a new Snowflake ProxyService (every boot)☆26Updated last year
- Read-only mirror of https://0xacab.org/jvoisin/mat2☆83Updated 2 months ago
- Brute Force Tool for masterkey.cryptomator Files☆32Updated last year
- Tor DDoS Protection - iptables rules for Tor relay operators to mitigate DDoS☆69Updated 6 months ago
- A comprehensive guide to using AI technologies safely while protecting your privacy. Covers self-hosted solutions, popular AI services, b…☆42Updated last month
- A simple web interface for Picocrypt.☆9Updated 4 months ago
- mirror of https://gitlab.com/bkil/freedom-fighters☆18Updated last week
- I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer☆41Updated last week
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆54Updated 5 months ago
- A command-line interface for Picocrypt.☆63Updated 3 weeks ago