INTERLOCK - file encryption and HSM front-end
☆305Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for interlock
Users that are interested in interlock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- USB armory - The open source compact secure computer☆1,467Updated this week
- hid emulation tools for the usbarmory☆68Dec 12, 2016Updated 9 years ago
- USB armory Debian base image☆85Updated this week
- NXP Security Controller (SCCv2) - Linux driver☆19Feb 14, 2025Updated last year
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Oct 8, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- USB armory - hardware control tool☆34Aug 27, 2025Updated 7 months ago
- The bare metal Go smart card☆204Mar 9, 2026Updated last month
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- USB armory - Mass Storage firmware☆24Mar 9, 2026Updated last month
- utility for emulating a USB HID keyboard with the USBArmory☆44Mar 1, 2018Updated 8 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆245Oct 13, 2025Updated 5 months ago
- TextSecure client package for Go☆128Jan 9, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- opmsg message encryption☆756Mar 2, 2023Updated 3 years ago
- Tenshi - log monitoring tool☆51Jan 13, 2026Updated 2 months ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆350Dec 8, 2022Updated 3 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- USB armory - boot loader☆39Mar 16, 2026Updated 3 weeks ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 13 years ago
- One-Time-Programmable (OTP) fusing tool☆69Mar 19, 2026Updated 3 weeks ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 10 years ago
- UDeck - USB Deck is a set of scripts for BeagleBone Black to allow write blocking, USB impersonation, and a scriptable USB keyboard with …☆21Sep 5, 2015Updated 10 years ago
- kext kills all 32bit binaries lacking __PAGEZERO (required for exploitation of kernel NULL derefs)☆114Aug 27, 2015Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- ☆15Apr 5, 2016Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆56Jan 25, 2016Updated 10 years ago
- Boot to Gecko aims to create a complete, standalone operating system for the open web.☆14Mar 9, 2015Updated 11 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- XNU Rootkit Framework☆125Jan 3, 2015Updated 11 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 10 years ago
- ☆30Jul 29, 2014Updated 11 years ago