google / ukip
USB Keystroke Injection Protection
☆536Updated last year
Alternatives and similar repositories for ukip:
Users that are interested in ukip are comparing it to the libraries listed below
- CLOSE ACCESS DENIAL.☆1,485Updated 2 weeks ago
- Tool to find common vulnerabilities in cryptographic public keys☆280Updated this week
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 3 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆525Updated last year
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆800Updated 4 months ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆508Updated last year
- ☆194Updated 4 years ago
- Security, hacking conferences (list)☆522Updated last week
- The TLS-Scanner Module from TLS-Attacker☆274Updated 2 weeks ago
- ☆1,265Updated 2 months ago
- Tracking history of USB events on GNU/Linux☆1,165Updated 2 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆150Updated 4 years ago
- A fast and secure multi protocol honeypot.☆317Updated 2 years ago
- JackIt - Exploit Code for Mousejack☆842Updated 4 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,596Updated 4 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆840Updated last week
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358Updated 10 months ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆293Updated 3 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,534Updated 3 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆684Updated 2 weeks ago
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆170Updated 2 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆245Updated 3 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆381Updated 3 years ago
- Private key usage verification☆431Updated 3 weeks ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆193Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,344Updated last month
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,921Updated 2 years ago
- Named vulnerabilities and their practical impact☆434Updated 3 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆796Updated 11 months ago