Security & Privacy Software
Gnome Authenticator
Gnome Authenticator is a GNOME-based two factor authentication application built for Linux-based operating systems for both mobile and desktop.
Openswan
Openswan has been a popular VPN alternative for Linux users since2005. It is an IPsec implementation with support for most of its extensions (RFC and IETF drafts), even IKEv2, NAT Traversal, X.509 Digital Certificates and more. Openswan comes packages with various Linux distributions, including Gentoo, Fedora, Ubuntu, Red Hat and others.
ReverseSSH
ReverseSSH is a statically-linked ssh server with a reverse connection feature for simple yet powerful remote access. Most people find ReverseSSH useful during HackTheBox, CTF's and similar challenges.
OTP Auth
OTP Auth is an two factor authentication application that allow you to use calculated one time passwords for your online acconunts. OTP Auth is avalible for iOS and macOS, and works with popular online services such as Google Mail, Amazon, GitHub, Dropbox and many more.
GuardMetrics
GuardMetrics is a security operations management software designed for security guard services who seeks an affordable, yet very capable, means to compete. With GuardMetrics you can track and mange your guard tours and patrols, while allowing your gaurds to send reports from your officers from any smart-device, including their personal devices.
Signal
Signal is a cross-platform encrypted messaging application that has a strong focus on privacy. The application is developed by Signal Messenger LLC and provides users with features like one-to-one and group messages, which can include files, voice notes, images and videos. The software is famous for being used by the whistleblower and privacy advocate Edward Snowden who once said "I use Signal every day, it is the most scalable encryption tool we have".
CyberGhost VPN
Without a VPN service, everything you do online gets tracked, followed, and even spied on. However, when using a virtual private network, you’re virtually putting on an online invisibility cloak. With CyberGhost VPN you can utilize the power of the internet with an encrypted connection is 100% anonymous and untraceable. CyberGhost VPN is powered by over 15 years experience and over 6800 servers across the globe that will ensure personal privacy when using the web.
Private Internet Access
Private Internet Access or PIA for short, has the largest virtual private network capacity across the globe to provide the highest speeds and most encryption. The service prides it self of being privacy-focused and is the only VPN server that has a proven non-log record. Apps provided by Private Internet Access use OpenVPN and WireGuard, two of the latest, most secure protocols. OpenVPN uses AES-128 encryption by default, but you can bump that up to AES-256 in the settings. With Private Internet Access you can also set the data authentication and handshake methods, including RSA-2048 and RSA-4096.
Magisk
Magisk is known as a "systemless" root method. It's essentially a way to modify the system without actually modifying it. Modifications are stored safely in the boot partition instead of on the main system. With Magisk you can root phone or tablet to give you complete control over the system with compromising your device.
WP Security Audit Log
WP Security Audit Log is a comprehensive activity log plugin for WordPress-powered websites. With WP Security Audit Log, it's easy to keep audit logs of all user and under the hood changes, ease troubleshooting, improve user accountability and identify suspicious behavior early.