errbufferoverfl / usb-canary
A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆580Updated 7 years ago
Alternatives and similar repositories for usb-canary:
Users that are interested in usb-canary are comparing it to the libraries listed below
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,096Updated 6 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- All your IPs are belong to us.☆669Updated 6 years ago
- The USG is Good, not Bad☆404Updated 5 years ago
- Cleans out "open" wireless connections from OSX machine☆152Updated 4 years ago
- Your best is an idiot☆138Updated 9 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆767Updated 4 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- A framework for wireless pentesting.☆1,206Updated 4 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆356Updated 9 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Pixel-perfect LastPass phishing☆338Updated 9 years ago
- A fast and stealthy credential harvester☆624Updated last year
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated last year
- Automated WiFi limit evasion☆118Updated 8 years ago
- USB key cleaner☆465Updated last year
- Detect silent (unwanted) changes to files on your system☆160Updated 4 years ago
- MAC address age tracking☆575Updated this week