richmr / ChaosDrive
USB shenanigans
☆16Updated 5 years ago
Alternatives and similar repositories for ChaosDrive:
Users that are interested in ChaosDrive are comparing it to the libraries listed below
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- Command line utility for parsing certificates☆63Updated 4 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A framework to track the evolution of Operating Systems over time☆58Updated last year
- ☆22Updated 7 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆30Updated 6 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Web of trust grapher☆38Updated 2 weeks ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 7 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- ☆25Updated 7 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- ☆15Updated 8 years ago
- Host files with DNS☆32Updated 9 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- ☆26Updated 6 years ago
- ☆92Updated 7 years ago
- Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689☆18Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Notebook collection☆10Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year