snovvcrash / usbrip
Tracking history of USB events on GNU/Linux
☆1,154Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for usbrip
- Build interactive map of cameras from Shodan☆1,248Updated 4 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,187Updated 5 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,657Updated 3 weeks ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆579Updated 5 months ago
- SkySafe Miscellaneous Reverse Engineering Blog☆759Updated 9 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,577Updated last year
- Modern tactical exploitation toolkit.☆835Updated 3 months ago
- DNS covert channel implant for Red Teams.☆731Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆616Updated last month
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,549Updated 3 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆278Updated last week
- Drone pentesting framework console☆1,441Updated 11 months ago
- mXtract - Memory Extractor & Analyzer☆582Updated 3 years ago
- Phishing catcher using Certstream☆1,709Updated 2 months ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆623Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆1,308Updated 4 years ago
- Data exfiltration over DNS request covert channel☆846Updated 6 months ago
- Pop shells like a master.☆1,442Updated 5 years ago
- Bash post exploitation toolkit☆718Updated last year
- Capture handshakes of nearby WiFi networks automatically☆728Updated 3 years ago
- A mostly-serverless distributed hash cracking platform☆795Updated 7 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,451Updated 8 months ago
- A framework for wireless pentesting.☆1,193Updated 4 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆513Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,901Updated last year
- VirtualBox E1000 Guest-to-Host Escape☆1,403Updated 5 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,191Updated last month
- TotalRecon installs all the recon tools you need☆460Updated 4 years ago
- Collection of pentesting scripts☆429Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,785Updated 2 years ago