trpt / usbdeathLinks
anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device removal
☆131Updated 8 years ago
Alternatives and similar repositories for usbdeath
Users that are interested in usbdeath are comparing it to the libraries listed below
Sorting:
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆268Updated 11 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- KeePass 2 database master-password cracker☆135Updated 7 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak security☆250Updated 6 years ago
- 3WiFi Wireless Database☆257Updated 3 years ago
- The Pereval server: a set of OSINT & misc related web-services☆37Updated 5 years ago
- Truehunter☆31Updated 4 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- WiFi Pineapple DIY☆79Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 5 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆241Updated 4 years ago
- The best DOS Tool Out There!☆22Updated 9 years ago
- Take back your privacy. Lose yourself in the haystack.☆563Updated 8 months ago
- Pastejacking - PasteZort☆83Updated 6 years ago
- 👻 A LAN dropbox chatbot controllable via Telegram☆355Updated 5 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 8 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆99Updated 8 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- Tor-based proxy for linux☆66Updated 5 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago
- new WPS attack tool☆57Updated 10 years ago
- Fetch, install and search exploit archives from exploit sites.☆116Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- ☆130Updated 6 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Does some google dorks against a domain☆165Updated 5 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Bluetooth Honeypot☆262Updated 4 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago