badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux
☆69Oct 1, 2017Updated 8 years ago
Alternatives and similar repositories for USBlok
Users that are interested in USBlok are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Apr 27, 2023Updated 3 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Feb 10, 2021Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆242May 22, 2023Updated 2 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆325Jun 25, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆111Aug 18, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 6 years ago
- AM radio data exfiltration with CPU cache in assembly☆20Dec 7, 2023Updated 2 years ago
- Simple detector of ARP poisoning attack☆29Apr 23, 2015Updated 11 years ago
- PE file mapping and manipulation package.☆35May 6, 2022Updated 3 years ago
- minepeon-base☆24Jul 2, 2014Updated 11 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆307Jan 12, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Apr 13, 2020Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- BadUSB DigiSpark sketches and Powershell Scripts☆39Jun 19, 2019Updated 6 years ago
- Bad USB collections with malicious firmware☆75Jan 10, 2015Updated 11 years ago
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- great android hacking app -enjoy hacking your friends and remember am always never responsible for your malicious activities☆11Jan 19, 2018Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Aug 5, 2012Updated 13 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Wordlist compiled from Twitter usernames☆18Aug 15, 2022Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 5 months ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆70Mar 11, 2018Updated 8 years ago
- SSH into your Weaved or Remot3.it connected Raspberry Pi with one command☆15Aug 26, 2018Updated 7 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago