robertchrk / evilmaidLinks
Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking your machine every time you leave for a coffee, it's about the leaving itself!
☆11Updated 8 years ago
Alternatives and similar repositories for evilmaid
Users that are interested in evilmaid are comparing it to the libraries listed below
Sorting:
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 3 weeks ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Tutorials for getting started with Pwntools☆12Updated 3 years ago
- Single-Clich-Proxy-Chains☆10Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Free Email Providers☆10Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Automate Blind SQL Injection with Python.☆23Updated 2 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Updated 2 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆18Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆24Updated last year
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆14Updated last year
- Damn Small SQLi Scanner. (DSSS)☆16Updated 7 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago