badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux
☆68Oct 1, 2017Updated 8 years ago
Alternatives and similar repositories for USBlok
Users that are interested in USBlok are comparing it to the libraries listed below
Sorting:
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Feb 10, 2021Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆241May 22, 2023Updated 2 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆327Jun 25, 2022Updated 3 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆110Aug 18, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- AM radio data exfiltration with CPU cache in assembly☆20Dec 7, 2023Updated 2 years ago
- Simple detector of ARP poisoning attack☆29Apr 23, 2015Updated 10 years ago
- PE file mapping and manipulation package.☆36May 6, 2022Updated 3 years ago
- minepeon-base☆24Jul 2, 2014Updated 11 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆304Jan 12, 2023Updated 3 years ago
- Bad USB collections with malicious firmware☆75Jan 10, 2015Updated 11 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Apr 13, 2020Updated 5 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- BadUSB DigiSpark sketches and Powershell Scripts☆38Jun 19, 2019Updated 6 years ago
- great android hacking app -enjoy hacking your friends and remember am always never responsible for your malicious activities☆11Jan 19, 2018Updated 8 years ago
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Aug 5, 2012Updated 13 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 5 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,789Jul 27, 2024Updated last year
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆70Mar 11, 2018Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- SSH into your Weaved or Remot3.it connected Raspberry Pi with one command☆15Aug 26, 2018Updated 7 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- An extensible dead-man's switch system☆25Jul 31, 2016Updated 9 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year