google / ukipLinks
USB Keystroke Injection Protection
☆539Updated last year
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- A fast and secure multi protocol honeypot.☆322Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 3 years ago
- CLOSE ACCESS DENIAL.☆1,496Updated this week
- Prevent RubberDucky (or other keystroke injection) attacks☆525Updated last year
- Python library for connecting to CertStream☆448Updated 11 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- Private key usage verification☆431Updated 2 months ago
- ☆522Updated 5 months ago
- A framework for layer 2 attacks☆780Updated last year
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆433Updated 9 months ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,014Updated last month
- Scalpel is an open source data carving tool. It is not being actively maintained.☆650Updated last year
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆831Updated 4 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆151Updated 5 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆478Updated 5 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,574Updated 8 months ago
- A query aggregator for OSINT based threat hunting☆899Updated this week
- Proof-of-concept for Spook.js☆71Updated 3 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆88Updated 2 years ago
- Everything related to Linux Forensics☆702Updated last year
- Automation and Scaling of Digital Forensics Tools☆768Updated 2 weeks ago
- Tracking history of USB events on GNU/Linux☆1,169Updated 2 years ago
- Credentials catching honeypot☆379Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated last month
- Tool and framework for securely reading untrusted USB mass storage devices.☆347Updated this week
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- ☆251Updated 4 years ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆699Updated 3 weeks ago