google / ukipLinks
USB Keystroke Injection Protection
☆549Updated 2 years ago
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆310Updated 10 months ago
- A fast and secure multi protocol honeypot.☆325Updated 3 years ago
- Tracking history of USB events on GNU/Linux☆1,178Updated 3 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆769Updated last year
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆455Updated last year
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆297Updated last year
- CLOSE ACCESS DENIAL.☆1,530Updated last week
- Prevent RubberDucky (or other keystroke injection) attacks☆530Updated last year
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆213Updated 3 years ago
- Source to www.draw.io☆97Updated 6 years ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆396Updated 5 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆543Updated 7 months ago
- ☆232Updated 2 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Updated 4 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆313Updated 3 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- ☆523Updated 10 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆832Updated 11 months ago
- ☆1,281Updated 7 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆796Updated 3 years ago
- ☆207Updated 2 years ago
- Hash identification program.☆153Updated 3 years ago
- ☆252Updated 4 years ago
- List of the tools and usage☆234Updated 5 months ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Automation and Scaling of Digital Forensics Tools☆778Updated last month
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- A framework for layer 2 attacks☆815Updated 2 years ago
- Security, hacking conferences (list)☆541Updated 2 weeks ago