google / ukipLinks
USB Keystroke Injection Protection
☆548Updated 2 years ago
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆318Updated last year
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆534Updated 4 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆769Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,177Updated 3 years ago
- A fast and secure multi protocol honeypot.☆326Updated 3 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆155Updated 5 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆522Updated last month
- Prevent RubberDucky (or other keystroke injection) attacks☆529Updated last year
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆218Updated 3 years ago
- ☆1,283Updated 9 months ago
- ☆252Updated 5 years ago
- The TLS-Scanner Module from TLS-Attacker☆281Updated 4 months ago
- List of the tools and usage☆234Updated 7 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆844Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆318Updated 3 years ago
- CLOSE ACCESS DENIAL.☆1,535Updated this week
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 4 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Tool to find common vulnerabilities in cryptographic public keys☆310Updated this week
- ☆228Updated 2 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated 2 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆464Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆301Updated 2 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆103Updated last month
- DNS covert channel implant for Red Teams.☆733Updated 6 years ago
- Canarytokens helps track activity and actions on your network.☆2,015Updated this week
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆467Updated last year
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆611Updated 6 months ago
- Tools for investigating Log4j CVE-2021-44228☆94Updated 4 years ago