CIRCL / Circlean
USB key cleaner
☆460Updated last year
Alternatives and similar repositories for Circlean:
Users that are interested in Circlean are comparing it to the libraries listed below
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- Transparent network tap☆116Updated 9 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆579Updated 7 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Network Security Monitoring on Raspberry Pi type devices☆778Updated 7 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- The kernel patch and userspace tools to enable Linux software write blocking☆139Updated 4 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,016Updated 3 years ago
- INTERLOCK - file encryption and HSM front-end☆299Updated last month
- Docker configuration to quickly setup your own Canarytokens.☆616Updated last month
- Collection of IOCs related to targeting of civil society☆189Updated 3 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Evolving directions on building the best Open Source Forensics VM☆157Updated 6 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 4 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆54Updated last year
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆231Updated 9 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Information Dump Monitor☆599Updated 7 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆431Updated 3 years ago
- A low to medium interaction honeypot.☆466Updated last year
- Credentials catching honeypot☆377Updated 10 months ago
- The USG is Good, not Bad☆404Updated 5 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆143Updated 2 years ago
- ☆230Updated 5 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.☆192Updated 3 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago