Git-Mirrors
  • Joined on 2023-01-30
A universal, distributed and secure messaging protocol for Reticulum
Updated 2025-11-24 16:02:30 -05:00
Invidious is an alternative front-end to YouTube
Updated 2025-11-24 15:39:14 -05:00
LXMF client for Android, Linux and macOS allowing you to communicate with people or LXMF-compatible systems over Reticulum networks using LoRa, Packet Radio, WiFi, I2P, or anything else Reticulum supports.
Updated 2025-11-24 15:06:09 -05:00
KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
Updated 2025-11-24 09:59:58 -05:00
Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening
Updated 2025-11-24 07:27:11 -05:00
Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening
Updated 2025-11-24 07:27:11 -05:00
Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.
Updated 2025-11-24 04:06:01 -05:00
Securely and anonymously share files, host websites, and chat with friends using the Tor network
Updated 2025-11-24 03:50:49 -05:00
All Qubes OS Project documentation pages are stored as plain text files in this dedicated repository. By cloning and regularly pulling from this repo, users can maintain their own up-to-date offline copy of all Qubes documentation rather than relying solely on the Web.
Updated 2025-11-24 02:25:18 -05:00
This is a list of substantial, commercial-or-social-good mainstream websites which provide onion services.
Updated 2025-11-23 23:50:04 -05:00
A smart redirecting gateway for various frontend services
Updated 2025-11-23 19:21:02 -05:00
Updated 2025-11-23 19:02:00 -05:00
Full C implementation of Shufflecake. Shufflecake is a plausible deniability (hidden storage) layer for Linux.
Updated 2025-11-23 18:31:57 -05:00
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Updated 2025-11-23 14:07:21 -05:00