google / ukip
USB Keystroke Injection Protection
☆518Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ukip
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆453Updated 2 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆518Updated 8 months ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆209Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆779Updated 2 years ago
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆387Updated 2 months ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆344Updated 9 months ago
- ☆511Updated last year
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 3 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆150Updated 2 years ago
- AVML - Acquire Volatile Memory for Linux☆878Updated this week
- SkySafe Miscellaneous Reverse Engineering Blog☆760Updated 10 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆683Updated this week
- A mostly-serverless distributed hash cracking platform☆795Updated 7 months ago
- A fast and secure multi protocol honeypot.☆311Updated 2 years ago
- Reverse engineering basics in puzzle form☆180Updated 4 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆666Updated 2 months ago
- Passive hostname, domain and IP lookup tool for non-robots☆887Updated last month
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆286Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆533Updated 8 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆240Updated 2 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- VirusTotal Command Line Interface☆837Updated 3 months ago
- A passive subdomain finder☆326Updated last year
- Indicators of stalkerware apps☆263Updated 3 weeks ago
- A framework for layer 2 attacks☆723Updated last year
- A tool to help forensicate offline docker acquisitions☆529Updated last month
- ☆1,233Updated last year
- New TLS Padding Oracles☆124Updated last year
- Connect like there is no firewall. Securely.☆1,538Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,357Updated 2 years ago