daveti / GoodUSBLinks
Defending against malicious USB firmware in the Linux kernel
☆17Updated 9 years ago
Alternatives and similar repositories for GoodUSB
Users that are interested in GoodUSB are comparing it to the libraries listed below
Sorting:
- USB armory - hardware control tool☆34Updated 5 months ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- A USB armory based USB sandbox☆22Updated 8 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- Created by Jeffrey Martin via the GitHub Connector☆27Updated 11 months ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated this week
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- ☆29Updated 4 years ago
- A USB layer firewall for the Linux kernel☆37Updated 7 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Updated 2 years ago
- A way to force your wifi-pineapple to use SSL☆14Updated 8 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- ☆54Updated 2 weeks ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 4 years ago
- Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak☆18Updated 2 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆27Updated 6 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 9 years ago
- ☆34Updated 8 years ago
- ☆34Updated 6 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- Rootless keylogger for X☆33Updated 6 years ago
- ☆59Updated 11 years ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago
- Network Traffic Fuzzer☆17Updated last year
- My little precious collection of Linux 4.x kernel rootkits☆28Updated last year
- Data EXfiltration TestER☆21Updated 6 years ago
- ClamAV Bytecode Compiler☆87Updated last year
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago