nyxxxie / de-LUKS
Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
☆25Updated 6 years ago
Alternatives and similar repositories for de-LUKS:
Users that are interested in de-LUKS are comparing it to the libraries listed below
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 3 years ago
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆47Updated 8 years ago
- Rogue AP killer☆89Updated 7 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- ☆22Updated 6 years ago
- ☆14Updated 5 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆16Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- ☆52Updated 5 years ago
- A Passive SSH back-end and scanner.☆103Updated 8 months ago
- Low-interaction VNC honeypot with a static challenge.☆23Updated 5 years ago
- DNS Botnet Server and Client☆34Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆81Updated 5 years ago
- Multi-head SSH honeypot system.☆21Updated 11 months ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated 9 months ago
- SNIcat☆126Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 5 years ago
- Easily Expandable Wireless Intrusion Detection System☆31Updated 4 years ago
- tor-openwrt☆40Updated 9 years ago
- Truehunter☆31Updated 3 years ago
- Application Layer IDS/IPS with iptables☆75Updated 6 years ago
- brute force SSH public-key authentication☆74Updated 10 months ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- ☆37Updated 2 years ago
- Open platform for sharing malware distribution sites☆37Updated 3 months ago
- ICMP and DNS tunneling via IPv4 and IPv6☆202Updated last year
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago