snovvcrash / usbripLinks
Tracking history of USB events on GNU/Linux
☆1,168Updated 3 years ago
Alternatives and similar repositories for usbrip
Users that are interested in usbrip are comparing it to the libraries listed below
Sorting:
- Build interactive map of cameras from Shodan☆1,265Updated 5 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,292Updated 6 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,631Updated 4 years ago
- mXtract - Memory Extractor & Analyzer☆592Updated 3 years ago
- Learning Shodan through katas☆466Updated 5 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,734Updated 10 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆607Updated last year
- Bash post exploitation toolkit☆741Updated 2 years ago
- Capture handshakes of nearby WiFi networks automatically☆767Updated 4 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,415Updated 6 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆727Updated this week
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆401Updated 7 years ago
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,780Updated 3 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆574Updated 3 months ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆524Updated 4 years ago
- AI-based, context-driven network device ranking☆300Updated last year
- Modern tactical exploitation toolkit.☆852Updated last week
- A guide and tool for cracking ssh known_hosts files with hashcat☆337Updated last year
- A mostly-serverless distributed hash cracking platform☆815Updated last year
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,726Updated 3 years ago
- Collection of pentesting scripts☆440Updated 3 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆288Updated 7 months ago
- Find open databases - Powered by Binaryedge.io☆1,379Updated 5 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆645Updated 4 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,328Updated 2 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆689Updated 5 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆869Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,758Updated 8 months ago