google / ukipLinks
USB Keystroke Injection Protection
☆545Updated 2 years ago
Alternatives and similar repositories for ukip
Users that are interested in ukip are comparing it to the libraries listed below
Sorting:
- SkySafe Miscellaneous Reverse Engineering Blog☆768Updated last year
- Tracking history of USB events on GNU/Linux☆1,169Updated 3 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- ☆252Updated 4 years ago
- A fast and secure multi protocol honeypot.☆324Updated 3 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆311Updated 9 months ago
- Prevent RubberDucky (or other keystroke injection) attacks☆527Updated last year
- Test ssh login key acceptance without having the private key☆216Updated 4 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- ☆230Updated 2 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Store your data in others DNS resolver cache☆1,052Updated 5 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- List of the tools and usage☆234Updated 3 months ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆209Updated 3 years ago
- Private key usage verification☆429Updated 6 months ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆394Updated 5 years ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆347Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated 6 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Updated 3 years ago
- ☆1,113Updated 4 years ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆461Updated 3 years ago
- Source to www.draw.io☆97Updated 6 years ago
- User-friendly Lightweight TPM Remote Attestation over Bluetooth☆171Updated 2 years ago
- ☆323Updated 4 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆258Updated 10 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆295Updated last year