CIRCL / CircleanLinks
USB key cleaner
☆477Updated 2 years ago
Alternatives and similar repositories for Circlean
Users that are interested in Circlean are comparing it to the libraries listed below
Sorting:
- Transparent network tap☆119Updated 10 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆336Updated 8 years ago
- for the louise☆244Updated 5 years ago
- INTERLOCK - file encryption and HSM front-end☆303Updated last month
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Docker configuration to quickly setup your own Canarytokens.☆638Updated 2 months ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆223Updated 5 years ago
- Usable Privacy Box☆171Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆331Updated 5 years ago
- A tool for processing a lot of pcaps using tshark☆153Updated last year
- The kernel patch and userspace tools to enable Linux software write blocking☆146Updated 5 years ago
- ☆234Updated 5 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆54Updated last year
- The USG is Good, not Bad☆402Updated 5 years ago
- Network Security Monitoring on Raspberry Pi type devices☆791Updated 7 years ago
- Information Dump Monitor☆598Updated 7 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆239Updated 9 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- ☆449Updated 10 months ago
- Credentials catching honeypot☆383Updated last year
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- food food food☆238Updated last month
- Linux file read monitor☆91Updated 2 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,026Updated 3 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Updated last year
- 3D reproduction of TSA Master keys☆71Updated 3 years ago