richmr / ChaosDrive
USB shenanigans
☆16Updated 5 years ago
Alternatives and similar repositories for ChaosDrive:
Users that are interested in ChaosDrive are comparing it to the libraries listed below
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆22Updated 6 years ago
- Notebook collection☆10Updated 5 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Web of trust grapher☆39Updated last week
- ld_preload userland rootkit☆34Updated 4 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆29Updated 6 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- Semantic SSH RSA keys☆25Updated 11 years ago
- ☆15Updated 8 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago
- An implementation of the DNS rebinding attack.☆16Updated 7 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 7 years ago
- CLIP OS toolkit (cosmk)☆16Updated 3 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- ☆25Updated 7 years ago
- A framework to track the evolution of Operating Systems over time☆58Updated last year
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- ☆32Updated 5 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago