security


  • uMatrix

    Free Mac Windows Linux Chrome Opera ... Chromium Firefox Website

    Point & click to forbid/allow any class of requests made by your browser. Use it to block scripts, iframes, ads, facebook, etc.
    uMatrix: A point-and-click matrix-based firewall, with many privacy-enhancing tools.

    uMatrix put you in full control of where your browser is allowed to connect, what type of data it is allowed to download, and what it is allowed to execute. Nobody else decides for you: You choose. You are in full control of your privacy.

    Out of the box, uMatrix works in relax block-all/allow-exceptionally mode, meaning web sites which require 3rd-party scripts are likely to be "broken". With two clicks, uMatrix can be set to work in allow-all/block-exceptionally mode, which generally will not break web sites.

    Regarding the myth that "Chromium-based browsers can't reliably block JavaScript", see: https://github.com/gorhill/httpswitchboard/wiki/Blocking-javascript-execution-reliably-in-Chromium-based-browsers .

    • See ALL the remote connections, failed or attempted, depending on whether they were blocked or allowed (you decide).

    • A single-click to whitelist/blacklist one or multiple classes of requests according to the destination and type of data (a blocked request will NEVER leave your browser).

    • Efficient blacklisting: cookies won't leave your browser, JavaScript won't execute, plugins won't play, tracking pixels won't download, etc.

    • You do not have to solely rely on just one particular curated blacklist (arguably with many missing entries) outside which nothing else can be blocked: You are in full control.

    • Ease of use: uMatrix lets you easily whitelist/blacklist net requests which originate from within a web page according to a point-and-click matrix:

    • domain names (left column)
    • from very specific
    • to very generic
    • type of requests (top row)
    • cookies
    • CSS-related resources (stylesheets and web fonts)
    • images
    • plugins
    • scripts
    • XHR (requests made by scripts)
    • frames
    • others

     

    uMatrix icon
  • Keepass2Android

    Free Android Android Tablet Website

    Keepass2Android is an open source password manager application for Android. It reads and writes .kdbx-files, the database format used by the popular KeePass 2.x Password Safe for Windows and other desktop operating systems.
    The user interface is based on Keepassdroid (by Brian Pellin), ported from Java to Mono for Android. The backend uses the original KeePass libraries to handle file access to ensure file format compatibility.

    Main features of the App are

    • read/write support for .kdbx (KeePass 2.x) files
    • integrates with nearly every Android browser (see below)
    • QuickUnlock: Unlock your database once with your full password, re-open it by typing just a few characters (see below)
    • Integrated Soft-Keyboard: Switch to this keyboard for entering user credentials. This shields you from clipboard based password sniffers (see below)
    • support for editing entries including additional string fields, file attachments, tags etc.
    • Note: please install Keepass2Android (non offline version) if you want to open files directly from a webserver (FTP/WebDAV).
    • search dialog with all search options from KeePass 2.x.

     

    Keepass2Android icon
  • Hashtab

    Free Personal Windows Windows Explorer Website

    Fast and Simple. Users in over 200 countries have downloaded HashTab to use as a simple MD5 checker or for a more advanced file integrity check.

     

    Hashtab icon
  • VirusTotal

    Free Mac Windows Web Android Website

    VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.

    You can upload files up to 150 MB in size.

    Applications for Windows, Mac and Android are also available to upload files to VirusTotal service.

    Both VirusTotal and Rotarua Limited are owned by Google.

     

    VirusTotal icon
  • Sysinternals Suite

    Free Windows Website

    The Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. This file contains the individual troubleshooting tools and help files. It does not contain non-troubleshooting tools like the BSOD Screen Saver or NotMyFault.

    The Suite is a bundling of the following selected Sysinternals Utilities:

    AccessChk
    AccessEnum
    AdExplorer
    AdRestore
    Autologon
    Autoruns
    BgInfo
    CacheSet
    ClockRes
    Contig
    Coreinfo
    Ctrl2Cap
    DebugView
    Desktops
    Disk2vhd
    DiskExt
    DiskMon
    DiskView
    Disk Usage (DU)
    EFSDump
    Handle
    Hex2dec
    Junction
    LDMDump
    ListDLLs
    LiveKd
    LoadOrder
    LogonSessions
    NTFSInfo
    PageDefrag
    PendMoves
    PipeList
    PortMon
    ProcDump
    Process Explorer
    Process Monitor
    ProcFeatures
    PsExec
    PsFile
    PsGetSid
    PsInfo
    PsKill
    PsList
    PsLoggedOn
    PsLogList
    PsPasswd
    PsService
    PsShutdown
    PsSuspend
    RegDelNull
    RegJump
    RootkitRevealer
    SDelete
    ShareEnum
    ShellRunas
    SigCheck
    Streams
    Strings
    Sync
    TCPView
    VMMap
    VolumeID
    WhoIs
    WinObj
    ZoomIt

     

    Sysinternals Suite icon
  • Linux kernel

    Free Linux Website

    The Linux kernel is the operating system kernel used by the Linux family of Unix-like operating systems.

     

    Linux kernel icon
  • Cryptocat

    Free Mac Windows Linux Website

    Chat with your friends, securely.
    Cryptocat is free software with a simple mission: everyone should be able to chat with their friends in privacy.

     

    Cryptocat icon
  • CrypTool

    Free Windows Website

    The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool is used all over the world. It supports both contemporary teaching methods at schools and universities as well as awareness training for employees.

    Numerous classic and modern cryptographic algorithms (encryption and decryption, key generation, secure passwords, authentication, secure protocols, etc.)
    Visualization of several algorithms (Caesar, Enigma, RSA, Diffie-Hellman, digital signatures, AES, etc.)
    Cryptanalysis of several algorithms (Vigenère, RSA, AES, etc.)
    Cryptanalytical measurement methods (entropy, n-grams, autocorrelation, etc.)
    Related auxiliary methods (primality tests, factorization, base64 encoding, etc.)
    Number theory tutorial
    Comprehensive online help
    Accompanying script with additional information about cryptology
    And plenty more!

     

    CrypTool icon
  • Mullvad

    Commercial Mac Windows Linux Web Android ... iPhone Chrome OS Android Tablet iPad WireGuard Qubes OS OpenWrt Tomato IPFire pfSense OpenVPN DD-WRT Website

    Mullvad is a VPN service that helps keep your online activity, identity, and location private.

     

    Mullvad icon
  • SSHGuard

    Free Mac Linux Website

    SSHGuard monitors services through their logging activity. It reacts to messages about dangerous activity by blocking the source address with the local firewall. SSHGuard employs a clever parser that can transparently recognize several logging formats at once (syslog, syslog-ng, metalog, multilog, raw messages), and detects attacks for many services out of the box, including SSH, several ftpds, and dovecot. It can operate all the major firewalling systems, and features support for IPv6, whitelisting, suspension, and log message authentication.

     

    SSHGuard icon
  • AdAway

    Free Android Website

    An ad blocker that uses the hosts file. The hosts file contains a list of mappings between hostnames and IP addresses. When an app requests an ad, that request is directed to 127.0.0.1 which does nothing. There are options to run a web server to respond to blocked hostnames and to direct requests to the IP address of your choosing. You can automatically download hosts files from the app but it is possible to use your own and to add certain sites to the white- and black-lists.

     

    AdAway icon
  • Applocker

    Free Windows Website

    You can use AppLocker as part of your overall security strategy for the following scenarios:
    -Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment.

    -Prevent users from installing and using unauthorized applications.

    -Implement application control policy to satisfy security policy or compliance requirements in your organization.

     

  • ufw

    Free Linux Website

    Ufw stands for Uncomplicated Firewall, and is program for managing a netfilter firewall. It provides a command line interface and aims to be uncomplicated and easy to use.

     

  • Google Authenticator

    Free Android iPhone Blackberry Android Tablet iPad ... Android Wear Wordpress Website

    Google Authenticator generates 2-step verification codes on your phone.

    Enable 2-step verification to protect your account from hijacking by adding another layer of security. With 2-step verification signing in will require a code generated by the Google Authenticator app in addition to your account password.

    Features:

    • Generates codes even in airplane mode!
    • Support for multiple accounts
    • Support for multiple languages
    • Support for Android Wear

     

    Google Authenticator icon
  • Should I Remove It?

    Free Web Website

    Should I Remove It? is a very simple website that helps users, both technical and non technical, decide what programs they should remove from their PC. This typically includes finding and removing all sorts of crapware and bloatware such as adware, spyware, toolbars, bundled unwanted applications as well as many forms of malware.

    A Windows version of Should I Remove It? is included in Small Reason Antivirus iconReason Antivirus : the program simply scans your computer for all its' installed programs and then ranks what should be removed by leveraging the wisdom of the crowd (and of course our technical experts) to determine what should not be installed.

     

    Should I Remove It? icon
  • Unchecky

    Free Windows Website

    Tired of unchecking unrelated offers while installing software?

    Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a checkbox, and spent hours afterwards removing adware? Ever opened your browser after an installation, only to find out that you have a new homepage, a new search engine, or even a new browser?
    Unchecky aims to keep potentially unwanted programs out of your computer. 26 languages.

    Unchecks

    Unchecky automatically unchecks unrelated offers, both saving you mouse clicks and making it less likely to miss a checkbox of an unwanted offer.

    Warns

    Installers often try to sneak additional programs as a natural part of the installation. Unchecky warns you when you try to accept a potentially unwanted offer, which makes it less likely to be accepted accidentally.

    Updates automatically

    Install and forget. Unchecky automatically updates whenever a new version is available, so you don't have to worry about running the latest version.

     

    Unchecky icon
  • Private Internet Access

    Commercial Mac Windows Linux Android iPhone ... iPad Tomato pfSense OpenVPN DD-WRT Website

    VPN Service encrypts your connection and provides you with an anonymous IP to protect your privacy.

     

    Private Internet Access icon
  • Privacy Badger

    Free Web Microsoft Edge Chrome Opera Firefox Website

    Web browser add-on that automatically learns to block invisible trackers that ignore DNT signals.

     

    Privacy Badger icon
  • ProtonMail

    Freemium Web Android iPhone iPad Website

    Secure email with absolutely no compromises, brought to you by MIT and CERN scientists.

    Swiss Based
    ProtonMail is incorporated in Switzerland and our servers are located in Switzerland. We are outside of US and EU jurisdiction and all user data is protected by strict Swiss privacy laws.

    Zero Access
    Because of our end-to-end encryption, your data is already encrypted by the time it reaches our servers. We have no access to your messages, and since we cannot decrypt them, we cannot share them with third parties.

    Backwards Compatible
    ProtonMail works out of any modern web browser, there is nothing to install. We are also backwards compatible with other email providers so you can continue sending and receiving emails from friends who are not using ProtonMail.

    Forever Free
    We believe privacy is a fundamental human right and should be available for everyone. That's why we offer multi-tiered pricing including a free version that anyone can use. Let's bring privacy back to the people!

    Fully Anonymous
    We do not log IP addresses or require any personal information to sign up. We accept bitcoin and cash payments for paid accounts to ensure even paid account users have complete privacy.

    Cross Platform
    ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser.

     

    ProtonMail icon
  • LUKS

    Free Linux Website

    LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, it does not only facilitate compatibility among distributions, but also provides secure management of multiple user passwords. In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, enabling the user to transport or migrate his data seamlessly.

    LUKS was designed according to TKS1, a template design developed in TKS1 for secure key setup. LUKS closely reassembles the structure recommended in the TKS1 paper, but also adds meta data for cipher setup management and LUKS also supports for multiple keys/passphrases.

     

    LUKS icon
  • Tails

    Free Linux Electrum Tor Browser Bundle GNOME Tor ... VeraCrypt Thunderbird Website

    Tails is a Debian based live CD/USB with the goal of providing complete Internet anonymity for the user.

     

    Tails icon
  • mbed TLS

    Free Mac Windows Linux Android BSD Website

    mbed TLS (formerly known as PolarSSL) makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal coding footprint.

     

    mbed TLS icon
  • Signal

    Free Mac Windows Linux Android iPhone ... Android Tablet iPad Ubuntu Touch Website

    Using Signal, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media or attachments all with complete privacy. The server never has access to any of your communication and never stores any of your data.

    • Say Anything - Send high-quality group, text, picture, and video messages, all without SMS and MMS fees.
    • Speak Freely - Make crystal-clear phone calls to people who live across town, or across the ocean, with no long-distance charges.
    • Be Yourself - Signal uses your existing phone number and address book. There are no separate logins, usernames, passwords, or PINs to manage or lose.
    • Stay Secure - We cannot hear your conversations or see your messages, and no one else can either. No exceptions. You can even tap and hold on a contact's name to see advanced identity verification options. Everything in Signal is always end-to-end encrypted and painstakingly engineered in order to keep your communication safe.
    • Go Fast - Signal is optimized for speed without compromise. Our state-of-the-art Axolotl protocol is unmatched in its performance, strength, and reliability.
    • Remain Connected - Push notifications let you know when new messages have arrived, and they'll be waiting for you even if your battery dies or you temporarily lose service.
    • Get Organized - Unique archive functionality makes it easy to keep track of the conversations that matter to you right now.
    • Pay Nothing - Signal is supported by a team of dedicated developers, community donations, and grants. There are no advertisements, and it doesn't cost anything to use.
    • View Source - All of our code is free, open, and available on GitHub (https://github.com/signalapp ).
    • Join Movements - Technology developed by Open Whisper Systems is trusted and used by millions of people around the world every day.

     

    Signal icon
  • I2P

    Free Mac Windows Linux Android BSD Website

    The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.

     

    I2P icon
  • GMER

    Free Windows Website

    GMER is an application that detects and removes rootkits .

    It scans for:

    • hidden processes
    • hidden threads
    • hidden modules
    • hidden services
    • hidden files
    • hidden Alternate Data Streams
    • hidden registry keys
    • drivers hooking SSDT
    • drivers hooking IDT
    • drivers hooking IRP calls
    • inline hooks

    "all your rootkits are belong to us" - gmer.net

     

    GMER icon



Comments on security

gintoki
· Jan 2021 · Helpful Not helpful Report as spam

copperhead OS is a scam project please checkout GrapheneOS
otherwise pretty good guide

reply

Sign up to comment, it's simple!