Tool and framework for securely reading untrusted USB mass storage devices.
☆370Apr 13, 2026Updated this week
Alternatives and similar repositories for usbsas
Users that are interested in usbsas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- gmsad manages Active Directory group Managed Service Account (gMSA) on Linux☆41Dec 19, 2024Updated last year
- ☆55Oct 12, 2024Updated last year
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Multi Layer Archive – A pure Rust archive format with encryption, compression, digital signatures, and post-quantum cryptography☆368Apr 9, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Feb 21, 2024Updated 2 years ago
- Windows eventlog formatting, live fetching and querying utility in C☆20May 26, 2020Updated 5 years ago
- Building an Automated Perimeter Scanning System with Open Source Tools - NMAP, IVRE and Netbox☆14May 5, 2023Updated 2 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆19Oct 16, 2023Updated 2 years ago
- A python app using kivy and pynput to log and upload mouse dynamics.☆27Apr 24, 2022Updated 3 years ago
- PoC analyzer of your email address exposure on various services☆65Oct 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆174Mar 6, 2023Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,083Dec 11, 2024Updated last year
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆479Updated this week
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,067Oct 14, 2025Updated 6 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆123Jul 12, 2024Updated last year
- A set of tools to transfer data over a unidirectional network link (typically a network diode).☆58Apr 2, 2017Updated 9 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆802Apr 6, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Internship (research) project for SURF. Process (Net)Flow data into Nmap scans.☆12Jun 7, 2022Updated 3 years ago
- Network Security Sniffer☆851Jan 2, 2026Updated 3 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆397Jan 20, 2026Updated 2 months ago
- Articles, visuels et applications des Décodeurs☆13Aug 5, 2015Updated 10 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated 2 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆139Feb 16, 2026Updated 2 months ago
- Carve file metadata from NTFS index ($I30) attributes☆72Feb 3, 2024Updated 2 years ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,509Apr 1, 2026Updated 2 weeks ago
- Avilla Forensics FREE☆1,036Apr 4, 2026Updated 2 weeks ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 11 months ago