CIRCL / CircleanLinks
USB key cleaner
☆476Updated 2 years ago
Alternatives and similar repositories for Circlean
Users that are interested in Circlean are comparing it to the libraries listed below
Sorting:
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆335Updated 5 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Transparent network tap☆122Updated 10 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Personal Onion Router To Assure Liberty☆833Updated 7 years ago
- food food food☆239Updated 2 months ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,036Updated 4 years ago
- An All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.☆227Updated last year
- Docker configuration to quickly setup your own Canarytokens.☆641Updated last month
- The kernel patch and userspace tools to enable Linux software write blocking☆151Updated 5 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆529Updated last year
- Information Dump Monitor☆598Updated 7 years ago
- for the louise☆245Updated 5 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Usable Privacy Box☆172Updated last year
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆224Updated 5 years ago
- Collection of IOCs related to targeting of civil society☆189Updated 4 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Updated last year
- SIFT☆526Updated last year
- ☆233Updated 6 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- ☆453Updated last year
- INTERLOCK - file encryption and HSM front-end☆305Updated 2 months ago
- SIFT Bootstrap Script☆145Updated 8 years ago
- Malicious USB☆176Updated 2 years ago
- A low to medium interaction honeypot.☆473Updated last year
- The USG is Good, not Bad☆402Updated 6 years ago
- Network Security Monitoring on Raspberry Pi type devices☆791Updated 7 years ago