CIRCL / CircleanLinks
USB key cleaner
☆472Updated 2 years ago
Alternatives and similar repositories for Circlean
Users that are interested in Circlean are comparing it to the libraries listed below
Sorting:
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆332Updated 4 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆334Updated 7 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆579Updated 7 years ago
- Transparent network tap☆117Updated 9 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆241Updated 8 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆55Updated last year
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆833Updated 4 years ago
- Malicious USB☆171Updated last year
- INTERLOCK - file encryption and HSM front-end☆302Updated last month
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- The USG is Good, not Bad☆403Updated 5 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆407Updated 2 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,018Updated 3 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆626Updated 11 months ago
- Protect your Wireless Network from Evil Access Points!☆181Updated last year
- Credentials catching honeypot☆379Updated last year
- Linux file read monitor☆89Updated last year
- Prevent RubberDucky (or other keystroke injection) attacks☆525Updated last year
- This is a mini-firewall that completely isolates a target device from the local network.☆308Updated 11 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆237Updated 9 years ago
- Usable Privacy Box☆174Updated last year
- Docker configuration to quickly setup your own Canarytokens.☆626Updated last month
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 7 months ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆231Updated 4 years ago