USB Keystroke Injection Protection
☆549Jul 9, 2023Updated 2 years ago
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,304Jan 27, 2026Updated last month
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- a tool to analyze filesystem images for security☆512Oct 8, 2023Updated 2 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Jul 8, 2022Updated 3 years ago
- Awesome Firmware Security & Other Helpful Documents☆616Jul 24, 2019Updated 6 years ago
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆1,002Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated last year
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Fournir des ressources actionables de sécurité pour les services biomédicaux.☆11Mar 15, 2020Updated 5 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,683Oct 26, 2024Updated last year
- ☆45Apr 8, 2020Updated 5 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 8 months ago
- Guidance for mitigation web shells. #nsacyber☆981Jun 18, 2023Updated 2 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,348Dec 7, 2020Updated 5 years ago
- Allows installing or booting Operating Systems via PXE over the Network. We hopefully can implement RBCP (Intels Remote Boot Configuratio…☆15Jul 23, 2025Updated 7 months ago
- ☆32Feb 23, 2026Updated last week
- Experiments, snippets and other things related to Binary Ninja☆17Oct 22, 2024Updated last year
- ☆38Jul 3, 2020Updated 5 years ago
- ☆29Sep 27, 2020Updated 5 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated last month
- Virtual Machine Introspection, Tracing & Debugging☆596Feb 22, 2022Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆40Jan 13, 2026Updated last month
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,353Aug 12, 2024Updated last year
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆624Jun 13, 2020Updated 5 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,550Feb 19, 2026Updated last week
- IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database☆546Jun 25, 2023Updated 2 years ago
- A collection of SSL/TLS security related resources.☆56Jan 13, 2025Updated last year