Ventoy
Boot manager
A new bootable USB solution that allows for easy installation and persistence of multiple operating systems without relying on a separate partition or a persistent file.
A new bootable USB solution.
64k stars
660 watching
4k forks
Language: C
last commit: 3 months ago
Linked from 1 awesome list
auto-installbootable-usbbsdchromeosiso-fileslegacylinuxmultibootpersistencesecure-bootuefiunattendedunixusbwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| An integrated security monitoring and threat hunting platform that collects, analyzes, and responds to network traffic data | 3,347 |
| A tool designed to help users of hidden services identify operational security issues and track Dark Web sites | 2,900 |
| An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,492 |
| A utility to generate malicious network traffic patterns and evaluate security controls. | 1,271 |
| A comprehensive security solution for macOS that combines firewalling, proxying, and antivirus scanning to protect against trackers, malware, and other online threats. | 424 |
| Automated tool for identifying vulnerabilities and gathering information about network services and systems. | 3,700 |
| Anonymously shares files, hosts websites, and chats using the Tor network | 6,346 |
| A firewall application utilizing EBPF and XDP to provide stateful packet filtering and masquerading for IPv4/IPv6 networks. | 45 |
| Resources for deploying and managing Azure network security features programmatically. | 797 |
| An interactive application firewall that allows users to filter and manage network connections on GNU/Linux systems. | 11,023 |
| Database security suite with field-level encryption, search through encrypted data, SQL injections prevention and intrusion detection capabilities. | 1,368 |
| Automated setup and configuration of secure VPNs using Ansible | 29,048 |
| A comprehensive security platform that monitors and controls systems by analyzing logs, detecting threats, and responding to incidents. | 4,533 |
| A tool designed to automate the discovery and exploitation of security vulnerabilities in Unix systems. | 147 |
| A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |