snovvcrash / usbripLinks
Tracking history of USB events on GNU/Linux
☆1,167Updated 2 years ago
Alternatives and similar repositories for usbrip
Users that are interested in usbrip are comparing it to the libraries listed below
Sorting:
- Capture handshakes of nearby WiFi networks automatically☆756Updated 4 years ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Build interactive map of cameras from Shodan☆1,261Updated 4 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,604Updated 4 years ago
- A framework for wireless pentesting.☆1,209Updated 4 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,213Updated 6 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆601Updated last year
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,736Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,317Updated 8 months ago
- Network Analysis Tool☆3,239Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,660Updated 6 months ago
- Bash post exploitation toolkit☆733Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,739Updated 4 months ago
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,464Updated 4 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,506Updated last year
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆522Updated 3 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,256Updated 10 months ago
- Pop shells like a master.☆1,463Updated 6 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆681Updated 5 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,330Updated this week
- A guide and tool for cracking ssh known_hosts files with hashcat☆332Updated last year
- Modern tactical exploitation toolkit.☆850Updated 10 months ago
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,248Updated last month
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,363Updated 5 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- A manager for your secrets.☆948Updated 10 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆715Updated this week
- Get unencrypted 'Saved Password' from Google Chrome☆732Updated last year