gdbinit / armorysandbox
A USB armory based USB sandbox
☆20Updated 7 years ago
Alternatives and similar repositories for armorysandbox:
Users that are interested in armorysandbox are comparing it to the libraries listed below
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- ☆15Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- ☆13Updated 7 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- apbleed☆24Updated 10 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- ☆14Updated 5 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆40Updated 7 years ago
- A curated list of tools for incident response☆29Updated last year
- first commit☆20Updated last year
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Phishing Toolkit☆20Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- See here:☆42Updated 12 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆84Updated 6 years ago