nyxxxie / de-LUKSLinks
Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
☆27Updated 7 years ago
Alternatives and similar repositories for de-LUKS
Users that are interested in de-LUKS are comparing it to the libraries listed below
Sorting:
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆51Updated 9 years ago
- Multi-head SSH honeypot system.☆22Updated last year
- DNS zone transfer research☆59Updated 8 years ago
- Easily setup a hidden service inside the Tor network☆175Updated last year
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A Passive SSH back-end and scanner.☆104Updated 3 months ago
- A script used to create a whonix like gateway/workstation environment with docker containers.☆125Updated 5 years ago
- Private keys that have become public ...☆183Updated 3 weeks ago
- Rogue AP killer☆90Updated 7 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆144Updated 4 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆53Updated 12 years ago
- File transfer via DNS☆73Updated 8 years ago
- ☆15Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆84Updated 5 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER ma…☆37Updated last month
- ICMP and DNS tunneling via IPv4 and IPv6☆215Updated 6 months ago
- a more secure way to force programs to exclusively use tor network☆203Updated 3 years ago
- ☆145Updated 9 years ago
- HoneySAP: SAP Low-interaction research honeypot☆50Updated 2 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- Simple SSH Honeypot in Python☆70Updated 2 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆65Updated 4 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Truehunter☆31Updated 4 years ago
- Gets in the way of your victim's traffic and out of yours☆28Updated 6 years ago