google / ukipLinks
USB Keystroke Injection Protection
☆549Updated 2 years ago
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- SkySafe Miscellaneous Reverse Engineering Blog☆770Updated last year
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆310Updated 11 months ago
- Tracking history of USB events on GNU/Linux☆1,174Updated 3 years ago
- A fast and secure multi protocol honeypot.☆325Updated 3 years ago
- Reverse engineering basics in puzzle form☆182Updated 5 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆528Updated last year
- Named vulnerabilities and their practical impact☆436Updated 4 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- ☆252Updated 5 years ago
- ☆1,283Updated 8 months ago
- ☆1,109Updated 5 years ago
- AI-based, context-driven network device ranking☆302Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.☆800Updated 6 months ago
- MacStealer: Wi-Fi Client Isolation Bypass☆524Updated 2 weeks ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆344Updated 5 years ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆396Updated 5 years ago
- Store your data in others DNS resolver cache☆1,089Updated 6 years ago
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,259Updated last year
- ☆232Updated 2 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆218Updated 3 years ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆837Updated last year
- Source to www.draw.io☆98Updated 6 years ago
- List of the tools and usage☆234Updated 6 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆315Updated 3 years ago
- A crossplatform mDNS enumeration tool.☆362Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆299Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Updated 3 years ago
- Test ssh login key acceptance without having the private key☆216Updated 4 years ago