š Don't let threats reach your machines ā USB Mass Storage Gateway
ā17Oct 30, 2019Updated 6 years ago
Alternatives and similar repositories for USBleach
Users that are interested in USBleach are comparing it to the libraries listed below
Sorting:
- It's like DocBleach, but in your browserā18Oct 24, 2019Updated 6 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool iā¦ā21Jan 15, 2022Updated 4 years ago
- Sanitising your documents, one threat at a time. ā Content Disarm & Reconstruction Softwareā156Sep 18, 2023Updated 2 years ago
- Fuzzer for the Mac Kernelā18Jan 3, 2013Updated 13 years ago
- Cerberus is a toolkit to receive, parse, process and automate abuse reports handling received by ISP or hosting providers.ā15Jun 11, 2019Updated 6 years ago
- Get your WHMCS alerts on Slack.ā15Sep 18, 2015Updated 10 years ago
- ā15Jan 21, 2020Updated 6 years ago
- CVE-2016-5195 exploit written in Crystalā13Oct 25, 2016Updated 9 years ago
- Kernel module used by Douane firewallā23Jun 14, 2018Updated 7 years ago
- Simple Bash script to retrieve basic system information.ā30Apr 14, 2018Updated 7 years ago
- ā22May 27, 2016Updated 9 years ago
- A tool for recover router passwordā33Jun 19, 2018Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.ā34Nov 12, 2016Updated 9 years ago
- Parse HTTP Security Headersā40Sep 12, 2024Updated last year
- CVE-2014-0160 (Heartbeat Buffer over-read bug)ā15May 3, 2014Updated 11 years ago
- Remote Access Trojan(RAT), Miner, DDoSā35Nov 14, 2016Updated 9 years ago
- A Java implementation of in-toto runlibā11Jul 23, 2024Updated last year
- This script is written in Perl this is very good admin page finder.ā11Aug 29, 2020Updated 5 years ago
- Simple and efficent Markdown to HTML and PDF converter with styles.ā10May 17, 2020Updated 5 years ago
- Fluxion is a easy to use wifi cracker, to test your own networkā11Feb 8, 2017Updated 9 years ago
- ā10Jun 28, 2017Updated 8 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!ā12Feb 5, 2018Updated 8 years ago
- Simple Java ICAP Client for ICAP Services.ā10Oct 3, 2024Updated last year
- Repository for proxenet pluginsā14Jun 14, 2016Updated 9 years ago
- A sub-domain reconnaissance written in golangā12Jan 11, 2018Updated 8 years ago
- Change your DNS from the toolbar in OSX (10.9+)ā17Mar 16, 2017Updated 8 years ago
- Small helper program for monitor layouts.ā10Nov 9, 2016Updated 9 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platformā11Feb 10, 2023Updated 3 years ago
- Small and highly portable detection tests.ā12Oct 12, 2017Updated 8 years ago
- Mimikatz embedded as classesā28Oct 25, 2021Updated 4 years ago
- The Second Version of Car Demoā12Jan 6, 2023Updated 3 years ago
- Enhanced version of finddupe, a duplicate file detector for Windowsā11Dec 31, 2025Updated 2 months ago
- Set of text- and file-oriented utilities for processing texts, files and pipingā11Oct 16, 2024Updated last year
- PoC for hiding data within $MFTā12Aug 14, 2014Updated 11 years ago
- A curated list of CTF frameworks, libraries, resources and softwaresā10Nov 11, 2015Updated 10 years ago
- Metasploit Logos that use Z for the new zArch additionsā10Feb 9, 2016Updated 10 years ago
- Golang tool to scan hosts for SMB version and signing statusā15Nov 19, 2024Updated last year
- Porting BlueKeep PoC from @Ekultek to actual exploitsā11Jun 9, 2019Updated 6 years ago
- gnu radio filesā12Oct 6, 2015Updated 10 years ago