nyxxxie / de-LUKS
Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
☆25Updated 6 years ago
Alternatives and similar repositories for de-LUKS:
Users that are interested in de-LUKS are comparing it to the libraries listed below
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆48Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 3 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆82Updated 5 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆48Updated 2 months ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- A simple yet beautiful phishing proxy.☆52Updated 3 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- A Passive SSH back-end and scanner.☆102Updated 3 weeks ago
- Application Layer IDS/IPS with iptables☆75Updated 6 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Gets in the way of your victim's traffic and out of yours☆27Updated 5 years ago
- Multi-head SSH honeypot system.☆20Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- A DNS database debugger☆35Updated 2 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆202Updated last year
- ☆15Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆69Updated last year
- brute force SSH public-key authentication☆75Updated last year
- Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689☆18Updated last year
- Low-interaction VNC honeypot with a static challenge.☆22Updated 5 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Auth.log parser☆46Updated 6 years ago
- SMTP honeypot written in Golang☆28Updated 8 years ago
- IMAP or SMTP honeypot written in Golang☆25Updated 2 years ago