docbleach / USBleach
🚒 Don't let threats reach your machines — USB Mass Storage Gateway
☆17Updated 5 years ago
Alternatives and similar repositories for USBleach
Users that are interested in USBleach are comparing it to the libraries listed below
Sorting:
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- ☆18Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- Parse nmap scan data with Perl (official repo)☆36Updated 6 years ago
- ☆10Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- A local scanner for vulnerable web applications☆38Updated last month
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆16Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Random IPv6 - circumvents restrictive IP address-based filter and blocking rules☆23Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆30Updated 6 years ago