A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆583Oct 9, 2017Updated 8 years ago
Alternatives and similar repositories for usb-canary
Users that are interested in usb-canary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Feb 19, 2019Updated 7 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,588Mar 1, 2024Updated 2 years ago
- A tool to dump the login password from the current linux user☆4,118Sep 5, 2025Updated 8 months ago
- online port scan scraper☆1,121Aug 7, 2023Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SSH man-in-the-middle tool☆1,744Jul 2, 2021Updated 4 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,663Nov 24, 2020Updated 5 years ago
- A powerful and extensible wireless drop box☆267Jan 9, 2019Updated 7 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆501Aug 11, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,229Feb 6, 2022Updated 4 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- Command line utility for searching and downloading exploits☆1,809Sep 10, 2025Updated 8 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Issues to consider when planning a red team exercise.☆612Aug 23, 2017Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,221Nov 9, 2019Updated 6 years ago
- Seamlessly spy on SSH session like it is your tty☆347Sep 30, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- A framework for Backdoor development!☆435Mar 18, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,684Feb 14, 2024Updated 2 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,309Jul 10, 2024Updated last year
- ROCA: Infineon RSA key vulnerability☆493Oct 19, 2023Updated 2 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,284Nov 20, 2025Updated 6 months ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,993Jun 28, 2024Updated last year
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Apr 27, 2023Updated 3 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆797May 18, 2020Updated 6 years ago
- Distributed alerting for the masses!☆991Nov 1, 2018Updated 7 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆525Oct 20, 2018Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆741Mar 18, 2024Updated 2 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Feb 3, 2022Updated 4 years ago