niklasfemerstrand / panic_bcast
Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measure against cold-boot attacks.
☆225Updated 3 years ago
Alternatives and similar repositories for panic_bcast:
Users that are interested in panic_bcast are comparing it to the libraries listed below
- Docker container for running an IRC server as a Tor hidden service☆50Updated 6 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Panic button for protection against cold boot attacks☆140Updated 3 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆48Updated 9 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- TOR Mail encrypted server for Hidden Services☆39Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A web spider's worst nightmare.☆52Updated 12 years ago
- ☆30Updated 9 years ago
- Domain cralwer for various sites/databases☆9Updated 6 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 8 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- ☆12Updated 8 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆55Updated 8 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- ☆56Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago