google / ukipLinks
USB Keystroke Injection Protection
☆544Updated 2 years ago
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- Prevent RubberDucky (or other keystroke injection) attacks☆526Updated last year
- A fast and secure multi protocol honeypot.☆323Updated 3 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆306Updated 8 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 4 years ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆394Updated 5 years ago
- Tracking history of USB events on GNU/Linux☆1,168Updated 3 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆209Updated 3 years ago
- CLOSE ACCESS DENIAL.☆1,514Updated last week
- ☆1,275Updated 5 months ago
- ☆252Updated 4 years ago
- ☆520Updated 8 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆827Updated 9 months ago
- CAPTCHA22 is a toolset for building, and training, CAPTCHA cracking models using neural networks.☆335Updated 4 years ago
- ☆1,113Updated 4 years ago
- AI-based, context-driven network device ranking☆300Updated last year
- ☆196Updated 4 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated 5 months ago
- List of the tools and usage☆232Updated 3 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆293Updated last year
- A tool for processing a lot of pcaps using tshark☆153Updated last year
- A framework for layer 2 attacks☆802Updated 2 years ago
- A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.☆693Updated 4 months ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 4 years ago
- The TLS-Scanner Module from TLS-Attacker☆278Updated last week
- Source to www.draw.io☆97Updated 6 years ago
- USB key cleaner☆477Updated 2 years ago