docbleach / USBleach
🚒 Don't let threats reach your machines — USB Mass Storage Gateway
☆17Updated 5 years ago
Alternatives and similar repositories for USBleach:
Users that are interested in USBleach are comparing it to the libraries listed below
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Mass DNS resolution tool☆36Updated 4 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- ☆15Updated 8 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Updated 6 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- ☆18Updated last year
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- WordPress Honeypot☆32Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- ☆15Updated 5 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆30Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago