Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
β30May 29, 2018Updated 7 years ago
Alternatives and similar repositories for de-LUKS
Users that are interested in de-LUKS are comparing it to the libraries listed below
Sorting:
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)β13Jun 12, 2017Updated 8 years ago
- My World on GNU/Linuxβ11Jul 1, 2021Updated 4 years ago
- Automated Linux evil maid attackβ436Dec 22, 2015Updated 10 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergencyβ12Apr 16, 2020Updated 5 years ago
- Solutions from @PortSwigger labsβ13Apr 11, 2024Updated last year
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/β15Aug 4, 2018Updated 7 years ago
- β13May 29, 2020Updated 5 years ago
- My vim directoryβ52May 30, 2017Updated 8 years ago
- A SSTP server written in Go.β11Mar 22, 2018Updated 7 years ago
- Docker images for building portable binariesβ24Mar 13, 2026Updated last week
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructureβ31Aug 22, 2019Updated 6 years ago
- A productivity burp extension which reminds to take break while you are at work!β18May 31, 2020Updated 5 years ago
- Simple tool to automate brute forcing tasks against iOS apps, using Fridaβ15Oct 23, 2018Updated 7 years ago
- PowerShell Pass The Hash Utilsβ16Dec 9, 2018Updated 7 years ago
- Vagrant boxes built using Packerβ16Nov 4, 2025Updated 4 months ago
- Yara rules I've writtenβ10Dec 9, 2015Updated 10 years ago
- brcmfmac nvram filesβ12Dec 29, 2021Updated 4 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.β32Nov 23, 2025Updated 3 months ago
- β20Aug 18, 2020Updated 5 years ago
- shadowsocks + chisel = β€β€β23Mar 15, 2021Updated 5 years ago
- additional "s3" protocol for apt so you can host your giant apt repository in s3 on the cheap!β20Jul 23, 2014Updated 11 years ago
- Intel IPU6 Linux sensor enabling guidanceβ12Nov 20, 2023Updated 2 years ago
- β17Feb 20, 2026Updated last month
- Server-side SDK to provide a simple REST API for distribution of security information.β17May 11, 2016Updated 9 years ago
- Splunk Technology Add-On for pfsenseβ11Mar 30, 2022Updated 3 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted partiβ¦β23Dec 25, 2021Updated 4 years ago
- DEPRECATED: A C++ Elligator2 implementationβ15Apr 17, 2020Updated 5 years ago
- sign elf binaries with GPGβ17Oct 10, 2016Updated 9 years ago
- Security audit tool for Encrypt.toβ14May 2, 2015Updated 10 years ago
- Official repo for Customized but Compromised: Assessing Prompt Injection Risks in User-Designed GPTsβ31Nov 22, 2023Updated 2 years ago
- Atomic Red Team Simple Parserβ13Sep 21, 2018Updated 7 years ago
- dnsoverhttps - D'oh!β14Sep 20, 2018Updated 7 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking youβ¦β11Sep 4, 2016Updated 9 years ago
- AIL project training materialsβ39Feb 24, 2026Updated 3 weeks ago
- XOR encryption CLI app written in Rustβ12Dec 23, 2018Updated 7 years ago
- Some RSA attacks with sageβ11Nov 15, 2016Updated 9 years ago
- Splunk scripted input for opening a backconnect shell on a remote forwarderβ45Nov 18, 2020Updated 5 years ago
- β13Aug 2, 2020Updated 5 years ago
- Collection of configuration files that can be used as good starting points to secure different services and toolsβ17Nov 11, 2025Updated 4 months ago