snovvcrash / usbripLinks
Tracking history of USB events on GNU/Linux
☆1,169Updated 2 years ago
Alternatives and similar repositories for usbrip
Users that are interested in usbrip are comparing it to the libraries listed below
Sorting:
- Build interactive map of cameras from Shodan☆1,264Updated 5 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,215Updated 6 years ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- mXtract - Memory Extractor & Analyzer☆594Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,614Updated 4 years ago
- Capture handshakes of nearby WiFi networks automatically☆760Updated 4 years ago
- Bash post exploitation toolkit☆737Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,679Updated 8 months ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆335Updated last year
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆401Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆603Updated last year
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,741Updated 3 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆525Updated 4 years ago
- A mostly-serverless distributed hash cracking platform☆812Updated last year
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆721Updated this week
- A framework for wireless pentesting.☆1,213Updated 4 years ago
- Pop shells like a master.☆1,472Updated 6 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,704Updated 3 years ago
- Modern tactical exploitation toolkit.☆852Updated last year
- Data exfiltration over DNS request covert channel☆870Updated last year
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆288Updated 5 months ago
- VirtualBox E1000 Guest-to-Host Escape☆1,412Updated 6 years ago
- Learning Shodan through katas☆465Updated 4 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,939Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Updated 6 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆836Updated 4 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆639Updated 4 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆576Updated last month
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,749Updated 6 months ago