errbufferoverfl / usb-canaryLinks
A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆583Updated 7 years ago
Alternatives and similar repositories for usb-canary
Users that are interested in usb-canary are comparing it to the libraries listed below
Sorting:
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Updated 6 years ago
- A command line tool to detect shared passwords☆403Updated 8 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆752Updated 7 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Seamlessly spy on SSH session like it is your tty☆349Updated 7 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- The USG is Good, not Bad☆401Updated 5 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆336Updated 8 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆450Updated 7 years ago
- Personal Onion Router To Assure Liberty☆831Updated 6 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆323Updated 5 years ago
- A web front-end for password cracking and analytics☆623Updated 3 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- Cleans out "open" wireless connections from OSX machine☆154Updated 5 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆361Updated 10 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆518Updated 6 years ago
- Malicious USB☆174Updated last year
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆521Updated 2 years ago
- USB key cleaner☆477Updated 2 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆410Updated 2 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆767Updated 5 years ago
- Remote administration service which uses twitter as a command and control server☆715Updated 4 years ago