badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux
☆69Oct 1, 2017Updated 8 years ago
Alternatives and similar repositories for USBlok
Users that are interested in USBlok are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Apr 27, 2023Updated 3 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Feb 10, 2021Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆243May 22, 2023Updated 3 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆325Jun 25, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆111Aug 18, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 6 years ago
- AM radio data exfiltration with CPU cache in assembly☆20Dec 7, 2023Updated 2 years ago
- Simple detector of ARP poisoning attack☆29Apr 23, 2015Updated 11 years ago
- minepeon-base☆24Jul 2, 2014Updated 11 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆308Jan 12, 2023Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Apr 13, 2020Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Wordlist compiled from Twitter usernames☆18Aug 15, 2022Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆14Mar 10, 2017Updated 9 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 6 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 5 months ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,798Jul 27, 2024Updated last year
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆70Mar 11, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- An extensible dead-man's switch system☆25Jul 31, 2016Updated 9 years ago
- Inject shellcode into running processes in Linux.☆44Jul 10, 2024Updated last year
- ☆11Jan 27, 2026Updated 3 months ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- SQL SERVER Exploitation.☆27Mar 18, 2017Updated 9 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago