errbufferoverfl / usb-canaryLinks
A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆579Updated 7 years ago
Alternatives and similar repositories for usb-canary
Users that are interested in usb-canary are comparing it to the libraries listed below
Sorting:
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Seamlessly spy on SSH session like it is your tty☆349Updated 7 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- The USG is Good, not Bad☆403Updated 5 years ago
- USB key cleaner☆472Updated 2 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- All your IPs are belong to us.☆670Updated 7 years ago
- Automated WiFi limit evasion☆118Updated 8 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆406Updated 2 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆767Updated 4 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 2 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆334Updated 7 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- Automated Linux evil maid attack☆427Updated 9 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- ☆135Updated 9 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆613Updated 6 years ago
- This repository contains a step-by-step guide and sample configs how to turn a Raspberry Pi Zero-W into a portable companion device. Buil…☆125Updated 7 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- A framework for wireless pentesting.☆1,209Updated 4 years ago
- A webshell framework for penetration testers.☆298Updated last year
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- powerful auto-backdooring utility☆747Updated 7 years ago