nyxxxie / de-LUKSLinks
Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
☆27Updated 7 years ago
Alternatives and similar repositories for de-LUKS
Users that are interested in de-LUKS are comparing it to the libraries listed below
Sorting:
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Rogue AP killer☆90Updated 7 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- a more secure way to force programs to exclusively use tor network☆201Updated 3 years ago
- A script used to create a whonix like gateway/workstation environment with docker containers.☆125Updated 5 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- A Passive SSH back-end and scanner.☆103Updated last month
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆142Updated 4 years ago
- brute force SSH public-key authentication☆77Updated 2 months ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆54Updated 12 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆175Updated last year
- Easily setup a hidden service inside the Tor network☆176Updated last year
- ICMP and DNS tunneling via IPv4 and IPv6☆212Updated 4 months ago
- Gets in the way of your victim's traffic and out of yours☆28Updated 5 years ago
- ☆126Updated 6 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 8 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- zero-trust remote firewall instrumentation☆251Updated last year
- Multi-head SSH honeypot system.☆21Updated last year
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆51Updated 8 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆203Updated 3 years ago
- Command line utility for parsing certificates☆65Updated 4 years ago
- Try to find the password of a LUKS encrypted volume.☆263Updated last year
- FTP Honeypot☆32Updated last year
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆48Updated 3 months ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- ☆15Updated 5 years ago