cea-sec / usbsasLinks
Tool and framework for securely reading untrusted USB mass storage devices.
☆349Updated last week
Alternatives and similar repositories for usbsas
Users that are interested in usbsas are comparing it to the libraries listed below
Sorting:
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆437Updated 10 months ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆268Updated 2 years ago
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆329Updated 5 months ago
- ☆268Updated 2 years ago
- A tool to recover content from files encrypted with intermittent encryption☆235Updated 5 months ago
- NTP Exfiltration Tool☆142Updated last year
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆227Updated 2 years ago
- ☆347Updated 2 years ago
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆170Updated 2 years ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆431Updated 9 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces…☆274Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆125Updated last week
- A fast and secure multi protocol honeypot.☆323Updated 2 years ago
- CRY.ME (CRYptographic MEssaging application)☆169Updated 2 years ago
- Network Security Sniffer☆807Updated 3 weeks ago
- ☆82Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆768Updated 2 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆74Updated 3 years ago
- ☆522Updated 6 months ago
- A Firefox add-on for OSINT investigations☆130Updated last month
- Download from .onion-domains faster.☆205Updated 2 months ago
- OS image for the PiRogue based on Debian 12☆158Updated last year
- RouterOS Security Inspector☆229Updated 2 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆156Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated last year
- A crossplatform mDNS enumeration tool.☆355Updated 2 years ago
- A monster cheatsheet on MITM attacks☆360Updated 2 months ago
- A list of public attacks on BitLocker☆317Updated 5 months ago
- A WPA3 dictionary cracker☆330Updated 2 years ago