hephaest0s / usbkill
« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
☆4,492Updated 10 months ago
Alternatives and similar repositories for usbkill:
Users that are interested in usbkill are comparing it to the libraries listed below
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆691Updated 11 months ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆3,965Updated 2 years ago
- Anonymous peer-to-peer instant messaging☆3,738Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,498Updated 6 years ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- Tweets metadata scraper & activity analyzer☆2,959Updated last year
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,285Updated 6 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,169Updated this week
- Securely and anonymously share files, host websites, and chat with friends using the Tor network☆6,391Updated 2 weeks ago
- GnuPG symmetric password manager☆1,550Updated 6 months ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,920Updated 7 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,660Updated last year
- SSH man-in-the-middle tool☆1,639Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,234Updated 3 years ago
- A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more…☆10,428Updated 2 years ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,964Updated 7 months ago
- An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.☆5,220Updated 2 weeks ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,346Updated 8 years ago
- A bittorrent filesystem based on FUSE.☆3,905Updated 5 months ago
- Sniffing browser history using HSTS☆935Updated 7 years ago
- A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.☆7,568Updated 2 months ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,242Updated 5 months ago
- 🔑🔥📈 Next Level PGP☆3,475Updated 5 years ago
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆11,955Updated last week
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,108Updated 4 years ago
- Exploitation Framework for Embedded Devices☆12,317Updated this week
- Count the number of people around you by monitoring wifi signals☆6,933Updated 5 months ago
- A demo of overriding what's in a person's clipboard☆1,427Updated last year
- Inject code and spy on wifi users☆2,594Updated 3 years ago
- Shared lists of problem domains people may want to block with hosts files☆4,550Updated 2 months ago