errbufferoverfl / usb-canary
A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆579Updated 7 years ago
Alternatives and similar repositories for usb-canary
Users that are interested in usb-canary are comparing it to the libraries listed below
Sorting:
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆831Updated 4 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆613Updated 6 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆334Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- BadUSB 2.0 USB-HID MiTM POC☆285Updated 8 years ago
- Cleans out "open" wireless connections from OSX machine☆152Updated 4 years ago
- Protect your Wireless Network from Evil Access Points!☆181Updated last year
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- USB key cleaner☆470Updated last year
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- Automated WiFi limit evasion☆118Updated 8 years ago
- All your IPs are belong to us.☆670Updated 6 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆458Updated last year
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆767Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,222Updated 5 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆752Updated 7 years ago
- A framework for wireless pentesting.☆1,208Updated 4 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- Various PoCs☆491Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago