nyxxxie / de-LUKSLinks
Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
☆27Updated 7 years ago
Alternatives and similar repositories for de-LUKS
Users that are interested in de-LUKS are comparing it to the libraries listed below
Sorting:
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆51Updated 8 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- a more secure way to force programs to exclusively use tor network☆201Updated 3 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆142Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Gets in the way of your victim's traffic and out of yours☆28Updated 6 years ago
- DNS zone transfer research☆59Updated 8 years ago
- SNIcat☆127Updated 4 years ago
- ☆22Updated 7 years ago
- Rogue AP killer☆90Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆213Updated 4 months ago
- brute force SSH public-key authentication☆77Updated 2 months ago
- Passwords of SSH Intruders Transferred to Text☆157Updated last year
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year
- A memorial site for Hackers and Infosec people who have passed☆138Updated last week
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Simple SSH Honeypot in Python☆69Updated 2 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- A script used to create a whonix like gateway/workstation environment with docker containers.☆125Updated 5 years ago
- ☆143Updated 6 years ago