trpt / usbdeathLinks
anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device removal
☆129Updated 8 years ago
Alternatives and similar repositories for usbdeath
Users that are interested in usbdeath are comparing it to the libraries listed below
Sorting:
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆273Updated 11 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak security☆298Updated 7 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- KeePass 2 database master-password cracker☆134Updated 7 years ago
- 3WiFi Wireless Database☆263Updated 3 years ago
- Pastejacking - PasteZort☆82Updated 6 years ago
- The Pereval server: a set of OSINT & misc related web-services☆35Updated 5 years ago
- The best DOS Tool Out There!☆22Updated 9 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆245Updated 5 years ago
- Metadata Anonymisation Toolkit☆114Updated 6 years ago
- SSLStrip version to defeat HSTS☆69Updated 3 years ago
- Auto discover and exploit LAN raspberry pi's☆109Updated last year
- WiFi Pineapple DIY☆79Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Truehunter☆30Updated 4 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Updated 9 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Updated 3 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆67Updated 8 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 8 years ago
- new WPS attack tool☆60Updated 10 years ago
- 👻 A LAN dropbox chatbot controllable via Telegram☆355Updated 6 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆100Updated 9 years ago
- Fetch, install and search exploit archives from exploit sites.☆118Updated 2 years ago
- Bluetooth Honeypot☆264Updated 5 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆317Updated 3 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Mobile UI for kismet☆183Updated last year
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 6 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago