nyxxxie / de-LUKSLinks
Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
☆27Updated 7 years ago
Alternatives and similar repositories for de-LUKS
Users that are interested in de-LUKS are comparing it to the libraries listed below
Sorting:
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Multi-head SSH honeypot system.☆22Updated last year
- a more secure way to force programs to exclusively use tor network☆206Updated 3 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Rogue AP killer☆92Updated 7 years ago
- ☆15Updated 5 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆145Updated 4 years ago
- ☆147Updated 9 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆53Updated 12 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆221Updated 7 months ago
- Simple SSH Honeypot in Python☆70Updated 2 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 9 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated 2 years ago
- zero-trust remote firewall instrumentation☆253Updated last year
- DNS zone transfer research☆59Updated 8 years ago
- Linux file read monitor☆91Updated 2 years ago
- Passwords of SSH Intruders Transferred to Text☆157Updated last year
- A script used to create a whonix like gateway/workstation environment with docker containers.☆125Updated 6 years ago
- Easily setup a hidden service inside the Tor network☆175Updated 2 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated last year
- SNIcat☆128Updated 4 years ago
- PDFExaminer Tool - Analyse PDF Malware☆63Updated 4 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago