google / ukipLinks
USB Keystroke Injection Protection
☆539Updated 2 years ago
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆299Updated 5 months ago
- A fast and secure multi protocol honeypot.☆322Updated 2 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆151Updated 5 years ago
- Tracking history of USB events on GNU/Linux☆1,168Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆304Updated 3 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 3 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆206Updated 3 years ago
- ☆522Updated 6 months ago
- USB key cleaner☆475Updated 2 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆523Updated last year
- AI-based, context-driven network device ranking☆298Updated last year
- The TLS-Scanner Module from TLS-Attacker☆277Updated last week
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- List of the tools and usage☆234Updated last week
- Behave! A monitoring browser extension for pages acting as "bad boi"☆341Updated 5 years ago
- Named vulnerabilities and their practical impact☆435Updated 3 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 2 months ago
- Private key usage verification☆431Updated 3 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆817Updated 6 months ago
- ☆252Updated 4 years ago
- A crossplatform mDNS enumeration tool.☆354Updated 2 years ago
- Test ssh login key acceptance without having the private key☆218Updated 3 years ago
- CLOSE ACCESS DENIAL.☆1,499Updated this week
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,229Updated this week
- Attack Surface Management since before Attack Surface Management was a thing☆649Updated this week
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Harden your Chrome browser via enterprise policy.☆291Updated 2 years ago
- A tool to help forensicate offline docker acquisitions☆548Updated 9 months ago
- Security, hacking conferences (list)☆529Updated 3 weeks ago