badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux
☆68Oct 1, 2017Updated 8 years ago
Alternatives and similar repositories for USBlok
Users that are interested in USBlok are comparing it to the libraries listed below
Sorting:
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Feb 10, 2021Updated 5 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆327Jun 25, 2022Updated 3 years ago
- Linux Memory Cryptographic Keys Extractor☆240May 22, 2023Updated 2 years ago
- Simple detector of ARP poisoning attack☆29Apr 23, 2015Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Reconstruct files from QR-code video data☆22Feb 15, 2018Updated 8 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Aug 5, 2012Updated 13 years ago
- minepeon-base☆24Jul 2, 2014Updated 11 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Mar 11, 2018Updated 7 years ago
- ☆11Jan 27, 2026Updated last month
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- 2 Linux Kernel Modules for Listing Tasks. The first iterates over the tasks linearly and the second iterates over the tasks with a depth-…☆14Jun 27, 2021Updated 4 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 8 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- Simple TOR Socks Proxy Container☆13Jun 8, 2016Updated 9 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- tools for analyzing strings from password lists☆58Aug 15, 2022Updated 3 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Jun 23, 2020Updated 5 years ago
- cracked password☆20Oct 2, 2013Updated 12 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year