nusenu / trustor-poc
trustor (PoC)
☆25Updated 3 years ago
Alternatives and similar repositories for trustor-poc:
Users that are interested in trustor-poc are comparing it to the libraries listed below
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- ☆80Updated last year
- ☆11Updated 3 years ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- ☆23Updated 6 months ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 3 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆53Updated last month
- Multi-head SSH honeypot system.☆20Updated last year
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- Minimalistic DNS logging tool☆43Updated 3 years ago
- A Passive SSH back-end and scanner.☆103Updated 2 weeks ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆14Updated 3 months ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- Truehunter☆31Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Native JACK support for Qubes OS (experimental)☆10Updated 7 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Randomizes clock when systems boots by adding a few seconds and nanoseconds to enforce the design goal, that the host clock and Gateway/…☆13Updated last month
- ld_preload userland rootkit☆34Updated 4 years ago
- Binary and Static Releases☆13Updated 3 weeks ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆47Updated last month
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago