CIRCL / Circlean
USB key cleaner
☆459Updated last year
Alternatives and similar repositories for Circlean:
Users that are interested in Circlean are comparing it to the libraries listed below
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- Usable Privacy Box☆173Updated 10 months ago
- Transparent network tap☆116Updated 9 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆136Updated last year
- for the louise☆242Updated 4 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆52Updated last year
- Protect your Wireless Network from Evil Access Points!☆181Updated last year
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆623Updated 7 months ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆578Updated 7 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆332Updated 7 years ago
- Collection of IOCs related to targeting of civil society☆188Updated 3 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- INTERLOCK - file encryption and HSM front-end☆299Updated last week
- Credentials catching honeypot☆376Updated 8 months ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆238Updated 7 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆232Updated 8 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆142Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 4 months ago
- The USG is Good, not Bad☆404Updated 5 years ago
- ☆229Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆371Updated last year
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆347Updated 2 years ago
- Panic button for protection against cold boot attacks☆140Updated 3 years ago
- Malicious USB☆171Updated last year
- SIFT☆500Updated last year
- The OSINT Omnibus (beta release)☆334Updated 9 months ago
- Web Sight Docker Deployment☆124Updated 7 years ago