A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover.
☆583Oct 9, 2017Updated 8 years ago
Alternatives and similar repositories for usb-canary
Users that are interested in usb-canary are comparing it to the libraries listed below
Sorting:
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- A powerful and extensible wireless drop box☆267Jan 9, 2019Updated 7 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,213Feb 6, 2022Updated 4 years ago
- online port scan scraper☆1,120Aug 7, 2023Updated 2 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆261Oct 18, 2017Updated 8 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 5 months ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,573Mar 1, 2024Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- SSH man-in-the-middle tool☆1,733Jul 2, 2021Updated 4 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- A tool to dump the login password from the current linux user☆4,089Sep 5, 2025Updated 5 months ago
- Issues to consider when planning a red team exercise.☆616Aug 23, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- WarBerryPi - Tactical Exploitation☆2,225Nov 9, 2019Updated 6 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,650Nov 24, 2020Updated 5 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Seamlessly spy on SSH session like it is your tty☆348Sep 30, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- EternalRocks worm☆467May 25, 2017Updated 8 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- ROCA: Infineon RSA key vulnerability☆492Oct 19, 2023Updated 2 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- Distributed alerting for the masses!☆992Nov 1, 2018Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,291Jul 10, 2024Updated last year
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆796May 18, 2020Updated 5 years ago
- A framework for Backdoor development!☆434Mar 18, 2018Updated 7 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆322Feb 7, 2018Updated 8 years ago