juliocesarfort / nukemyluks
Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.
☆45Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for nukemyluks
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- Truehunter☆30Updated 3 years ago
- Rogue AP killer☆88Updated 6 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- Simple detector of ARP poisoning attack☆28Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆224Updated 3 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆42Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆48Updated last year
- ☆15Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- ☆14Updated 4 years ago
- Honeypot (Dionaea and kippo) setup script☆82Updated 8 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- [- mxmap -]☆11Updated 3 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆59Updated 4 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 7 years ago
- Protect your parents from phishing☆39Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 5 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 2 years ago
- Command line utility for parsing certificates☆59Updated 3 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆48Updated 10 years ago
- Selective DNS proxy forwarding based on DNS threat blocking providers intelligence.☆57Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago