pentagridsec / shreddy2Links
The Raspberry Pi storage scrub station for USB thumb drives.
☆22Updated 4 years ago
Alternatives and similar repositories for shreddy2
Users that are interested in shreddy2 are comparing it to the libraries listed below
Sorting:
- Windows anti-forensics USB monitoring tool.☆69Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- DFF (Digital Forensics Framework)☆11Updated 4 years ago
- Ransomware base in Java for all operating systems☆19Updated 8 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Updated 3 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- ☆12Updated 4 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Updated 9 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Hackable Windows SandBox environment☆31Updated 2 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆72Updated 2 months ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- Generate CIA/NSA style project codenames☆21Updated 8 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Open YARA scan- and search engine☆25Updated 9 months ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 9 months ago
- A Darktrace CLI written in Python☆16Updated 6 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- ☆11Updated 4 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- USB Scanning device☆31Updated 3 months ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆31Updated last year
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago