usbarmory / interlockLinks
INTERLOCK - file encryption and HSM front-end
☆302Updated last month
Alternatives and similar repositories for interlock
Users that are interested in interlock are comparing it to the libraries listed below
Sorting:
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆237Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆334Updated 7 years ago
- The USG is Good, not Bad☆403Updated 5 years ago
- Quantum Insert☆212Updated 6 years ago
- Qubes component: antievilmaid☆150Updated 9 months ago
- USB armory Debian base image☆79Updated last month
- Quantum Insert detector/recorder☆307Updated 5 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆303Updated 3 years ago
- OpenPGP applet for the YubiKey NEO☆215Updated 5 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- Configuration to use gpg smartcards for ssh authentication☆111Updated 4 years ago
- YubiKey Personalization cross-platform library and tool☆304Updated last year
- Leakproof VPN for your Qubes OS system☆60Updated 7 years ago
- USB armory - The open source compact secure computer☆1,415Updated last week
- opmsg message encryption☆753Updated 2 years ago
- Cross platform personalization tool for the YubiKey NEO☆57Updated 8 years ago
- Subgraph OS Handbook☆122Updated 7 years ago
- Subgraph Application Firewall☆106Updated 6 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆359Updated 9 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆438Updated 7 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- Blog-type notes about building Onion sites☆143Updated 7 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 2 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆56Updated 6 years ago