veracryptcrack
HiddenVM
Our great sponsors
veracryptcrack | HiddenVM | |
---|---|---|
5 | 14 | |
12 | 2,211 | |
- | - | |
0.0 | 7.7 | |
almost 3 years ago | 11 days ago | |
Shell | Shell | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
veracryptcrack
- Help with password
- Forgot last 2 or 3 chars of password
- Forgot VeraCrypt container password
- Partial password help
-
Is there a good password cracker program for Veracrypt?
I did a couple of little example projects: https://github.com/BillDietrich/veracryptcrack and https://github.com/BillDietrich/veracryptcrack2
HiddenVM
- HiddenVM – Use any desktop OS without leaving a trace
- Digital War Against Putin -- Automated Google Reviews with Python
-
Virtualbox WITHIN Tails?
Well what a goddamn surprise. I happen to be fiddling around with the exact same thing as I'm snowed in today! Like others have said, this is not recommended if you have a serious threat model. But if you have a couple free USB sticks and like tinkering with this stuff, check out https://github.com/aforensics/HiddenVM
-
The Hitchhiker’s Guide to Online Anonymity (new draft version v0.7.8)
Added new sub-route to the TAILS route using the HiddenVM project https://github.com/aforensics/HiddenVM for providing Plausible Deniability within TAILS
-
Most Secure Host OS
As per the documentation of the HiddenVM project (see https://github.com/aforensics/HiddenVM#but-doesn-t-whonix-inside-tails-mean-tor-over-tor). The VMs won't be using TAILS Tor connectivity. So there is no network chaining. It's not Tor over Tor and the Whonix VMs will have their own classic Tor connectivity but benefiting from TAILS well implemented Amnesia on the Host. I had no important issues so far.
You could also use TAILS with HiddenVM https://github.com/aforensics/HiddenVM which is also quite secure combining both TAILS/Whonix and Veracrypt plausible deniability features if you want.
What are some alternatives?
Whonix - Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
BrowserBox - Install and run Firefox on Debian unattended in a virtual machine or on a computer.
go-incognito - Go Incognito: A Guide to Security, Privacy, & Anonymity
dohot - DoHoT: making practical use of DNS over HTTPS over Tor
mbp-tails - How to get Tails working on T2 Apple device (e.g. 2019 MacBook Pro) without needing external keyboard/mouse.
whoami-project - Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions
awesome-malware-analysis - Defund the Police.
merOS-virt - Build and Interact with a Set of Virtual Machines
bento - Packer templates for building minimal Vagrant baseboxes for multiple platforms
vagrant-boxes - The scripts that build my Vagrant base boxes.
vagrant-projects - Vagrant projects for Oracle products and other examples
thgtoa