snovvcrash / usbrip
Tracking history of USB events on GNU/Linux
☆1,166Updated 2 years ago
Alternatives and similar repositories for usbrip
Users that are interested in usbrip are comparing it to the libraries listed below
Sorting:
- Build interactive map of cameras from Shodan☆1,259Updated 4 years ago
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆767Updated last year
- Bash post exploitation toolkit☆731Updated last year
- mXtract - Memory Extractor & Analyzer☆591Updated 3 years ago
- A mostly-serverless distributed hash cracking platform☆806Updated last year
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆522Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated 11 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,655Updated 5 months ago
- SSH man-in-the-middle tool☆1,657Updated 3 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,209Updated 6 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,601Updated 4 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,458Updated 3 months ago
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- Pop shells like a master.☆1,461Updated 6 years ago
- Data exfiltration over DNS request covert channel☆867Updated last year
- TotalRecon installs all the recon tools you need☆464Updated 4 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,231Updated 3 weeks ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆669Updated last year
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,723Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,095Updated 3 years ago
- Modern tactical exploitation toolkit.☆848Updated 10 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,686Updated 2 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,697Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,710Updated 7 months ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,328Updated this week
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,734Updated 3 months ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,305Updated 7 months ago