cea-sec / usbsasLinks
Tool and framework for securely reading untrusted USB mass storage devices.
☆365Updated last week
Alternatives and similar repositories for usbsas
Users that are interested in usbsas are comparing it to the libraries listed below
Sorting:
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆457Updated last year
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆269Updated 2 years ago
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆337Updated 11 months ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆452Updated 3 weeks ago
- ☆353Updated 2 years ago
- ☆270Updated 2 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆174Updated 2 years ago
- NTP Exfiltration Tool☆147Updated 2 years ago
- QR code splitting☆138Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆134Updated 3 weeks ago
- ☆85Updated 2 years ago
- A tool to recover content from files encrypted with intermittent encryption☆239Updated 10 months ago
- Graphical remote desktop solution☆199Updated last year
- A list of public attacks on BitLocker☆400Updated 4 months ago
- Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).☆420Updated last year
- CRY.ME (CRYptographic MEssaging application)☆173Updated last month
- A Firefox add-on for OSINT investigations☆128Updated last month
- Network Security Sniffer☆836Updated this week
- Modern web-based distributed hashcracking solution, built on hashcat☆189Updated this week
- Signing-key abuse and update exploitation framework☆132Updated 7 months ago
- tool for generating wordlists or extending an existing one using mutations.☆389Updated 6 months ago
- A fast and secure multi protocol honeypot.☆325Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated last month
- ☆567Updated last year
- MacStealer: Wi-Fi Client Isolation Bypass☆524Updated 2 weeks ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 5 months ago
- OS image for the PiRogue based on Debian 12☆161Updated last year