errbufferoverfl / usb-canaryLinks
A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆583Updated 8 years ago
Alternatives and similar repositories for usb-canary
Users that are interested in usb-canary are comparing it to the libraries listed below
Sorting:
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Updated 6 years ago
- A command line tool to detect shared passwords☆403Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- Seamlessly spy on SSH session like it is your tty☆349Updated 8 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆337Updated 8 years ago
- Personal Onion Router To Assure Liberty☆830Updated 6 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 6 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆753Updated 7 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 8 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- The USG is Good, not Bad☆402Updated 5 years ago
- Cleans out "open" wireless connections from OSX machine☆154Updated 5 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- A web front-end for password cracking and analytics☆622Updated 3 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆519Updated 7 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆409Updated 2 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated 2 years ago
- Information Dump Monitor☆598Updated 7 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆838Updated 4 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆451Updated 7 years ago
- All your IPs are belong to us.☆671Updated 7 years ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- powerful auto-backdooring utility☆751Updated 7 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆768Updated 5 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago