NateBrune / silk-guardianView external linksLinks
<< Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious files, and turns off your computer.
☆720Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for silk-guardian
Users that are interested in silk-guardian are comparing it to the libraries listed below
Sorting:
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,572Mar 1, 2024Updated last year
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆129Jun 12, 2017Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Oct 9, 2017Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 9 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,875Updated this week
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Deadman is linux kernel module deadman-switch that responds to removal of a specific USB device (or the insertion of any).☆12Mar 9, 2023Updated 2 years ago
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,298Jan 27, 2026Updated 3 weeks ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Sep 20, 2017Updated 8 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,441Nov 26, 2018Updated 7 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆67Nov 28, 2021Updated 4 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,600Jun 13, 2025Updated 8 months ago
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆266Apr 21, 2025Updated 9 months ago
- ⛵️ Available - Crystal SOCKS Client and Server☆14Mar 27, 2021Updated 4 years ago
- Securely and anonymously share files, host websites, and chat with friends using the Tor network☆6,883Dec 10, 2025Updated 2 months ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆969Nov 27, 2023Updated 2 years ago
- Exploitation Framework for Embedded Devices☆12,968Jun 10, 2025Updated 8 months ago
- Raspberry Pi projects☆16Jan 16, 2017Updated 9 years ago
- GPU-based Onion Hash generator☆1,271Nov 9, 2020Updated 5 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,201Oct 4, 2023Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 6 years ago
- Detect snooper on your system!☆85Feb 6, 2017Updated 9 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,638Jul 18, 2024Updated last year
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆697May 13, 2022Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,648Nov 24, 2020Updated 5 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Jul 12, 2017Updated 8 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,289Jul 10, 2024Updated last year
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Script to create templates to use with VirtualBox to make vm detection harder☆769Nov 5, 2022Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,735May 28, 2024Updated last year
- Prevent RubberDucky (or other keystroke injection) attacks☆529Mar 1, 2024Updated last year
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- GitHub repository for the SecureDrop whistleblower platform. Do not submit tips here!☆3,773Updated this week
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,236Jan 28, 2026Updated 2 weeks ago