A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆583Oct 9, 2017Updated 8 years ago
Alternatives and similar repositories for usb-canary
Users that are interested in usb-canary are comparing it to the libraries listed below
Sorting:
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,572Mar 1, 2024Updated 2 years ago
- A tool to dump the login password from the current linux user☆4,087Sep 5, 2025Updated 6 months ago
- online port scan scraper☆1,121Aug 7, 2023Updated 2 years ago
- SSH man-in-the-middle tool☆1,732Jul 2, 2021Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,652Nov 24, 2020Updated 5 years ago
- A powerful and extensible wireless drop box☆267Jan 9, 2019Updated 7 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,216Feb 6, 2022Updated 4 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Oct 24, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Command line utility for searching and downloading exploits☆1,814Sep 10, 2025Updated 6 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- WarBerryPi - Tactical Exploitation☆2,227Nov 9, 2019Updated 6 years ago
- Seamlessly spy on SSH session like it is your tty☆347Sep 30, 2017Updated 8 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- ROCA: Infineon RSA key vulnerability☆491Oct 19, 2023Updated 2 years ago
- A framework for Backdoor development!☆434Mar 18, 2018Updated 8 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,293Jul 10, 2024Updated last year
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,237Nov 20, 2025Updated 4 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,988Jun 28, 2024Updated last year
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆796May 18, 2020Updated 5 years ago
- Nameserver DNS poisoning attacks made easy☆524Feb 26, 2017Updated 9 years ago
- Distributed alerting for the masses!☆991Nov 1, 2018Updated 7 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆522Oct 20, 2018Updated 7 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆739Mar 18, 2024Updated 2 years ago