Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.
☆515Apr 23, 2025Updated 11 months ago
Alternatives and similar repositories for kloak
Users that are interested in kloak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obfuscate keystroke timings to help protect privacy☆18Dec 21, 2016Updated 9 years ago
- Tirdad kernel module for random ISN generation☆28Mar 23, 2026Updated last week
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆58Mar 14, 2026Updated 2 weeks ago
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆576Mar 22, 2026Updated last week
- This is a soft fork of the Megalodon app, which itself is a fork of the official Mastodon Android app.☆14Jan 27, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An app launcher to start apps in a restrictive sandbox https://www.kicksecure.com/wiki/sandbox-app-launcher☆46Jan 11, 2026Updated 2 months ago
- A tool for plotting processes accessing the network☆91Jul 1, 2022Updated 3 years ago
- Take back your privacy. Lose yourself in the haystack.☆560Feb 28, 2025Updated last year
- Manifest V3 web extension for dynamic user specified actions☆15Dec 11, 2023Updated 2 years ago
- Hardened kernel configuration optimized for virtual machines. - https://www.kicksecure.com/wiki/Hardened-kernel☆54Feb 14, 2026Updated last month
- Tor Browser Downloader - Automates download and verification of Tor Browser from The Tor Project's website. This package is produced inde…☆16Updated this week
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆126Apr 6, 2020Updated 5 years ago
- If you want know, who use your computer when you are not nearby!☆48Sep 30, 2021Updated 4 years ago
- A zero knowledge messaging system built on zcash.☆40May 18, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)☆92Oct 13, 2025Updated 5 months ago
- Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and gl…☆1,792Updated this week
- zuluCrypt is a front end to cryptsetup and tcplay and it allows easy management of encrypted block devices☆572Feb 10, 2026Updated last month
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Open Source Linux Frontend to the ClamAV Antivirus Engine☆24Feb 13, 2022Updated 4 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆20Updated this week
- Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than m…☆704Updated this week
- Automated Hardening Framework for Ubuntu☆114Apr 12, 2024Updated last year
- Fend off malware at Qubes VM startup☆81May 1, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Rosenpass is a post-quantum-secure VPN that uses WireGuard to transport the actual data.☆1,322Mar 23, 2026Updated last week
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆66Feb 27, 2026Updated last month
- Script for searching for a word or symbol on the sites specified in the text file☆34Nov 14, 2025Updated 4 months ago
- TereStun — STUN over Teredo☆16Jan 20, 2023Updated 3 years ago
- ☆14Nov 30, 2022Updated 3 years ago
- An implementation of the BitTorrent protocol that is optimised for streaming media.☆171Jan 8, 2026Updated 2 months ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.