usbarmory / interlock
INTERLOCK - file encryption and HSM front-end
☆299Updated last week
Alternatives and similar repositories for interlock:
Users that are interested in interlock are comparing it to the libraries listed below
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆332Updated 7 years ago
- OpenPGP applet for the YubiKey NEO☆214Updated 4 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Updated 5 years ago
- Qubes component: antievilmaid☆148Updated 6 months ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆232Updated 8 years ago
- Configuration to use gpg smartcards for ssh authentication☆111Updated 4 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- Subgraph OS Handbook☆120Updated 7 years ago
- USB armory Debian base image☆79Updated 3 months ago
- Quantum Insert detector/recorder☆306Updated 5 years ago
- Cross platform personalization tool for the YubiKey NEO☆56Updated 7 years ago
- Blog-type notes about building Onion sites☆145Updated 7 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- Quantum Insert☆212Updated 6 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆272Updated 4 years ago
- Hardened kernel generation - Deprecated☆49Updated 7 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆145Updated last year
- Personal Onion Router To Assure Liberty☆822Updated 6 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 8 years ago
- TextSecure client package for Go☆129Updated 5 years ago
- Hacker OPSEC☆95Updated 6 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆354Updated 9 years ago
- Pond☆911Updated 3 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆56Updated 6 years ago
- Torbutton for Thunderbird and related *bird forks☆84Updated 5 years ago
- Scripts, learnings, sample configurations, and random whining☆147Updated 9 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- USB armory - The open source compact secure computer☆1,389Updated 3 months ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 9 years ago