trpt / usbdeath
anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device removal
☆130Updated 7 years ago
Alternatives and similar repositories for usbdeath
Users that are interested in usbdeath are comparing it to the libraries listed below
Sorting:
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆267Updated 11 years ago
- The Pereval server: a set of OSINT & misc related web-services☆36Updated 4 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- Pastejacking - PasteZort☆84Updated 6 years ago
- new WPS attack tool☆55Updated 9 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆95Updated 8 years ago
- ☆35Updated 11 years ago
- Orca - Targeted OSINT Framework☆90Updated last year
- WiFi Pineapple DIY☆74Updated 8 years ago
- Metadata Anonymisation Toolkit☆98Updated 5 years ago
- KeePass 2 database master-password cracker☆134Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Does some google dorks against a domain☆167Updated 5 years ago
- Auto discover and exploit LAN raspberry pi's☆106Updated last year
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak security☆232Updated 6 years ago
- The best DOS Tool Out There!☆22Updated 8 years ago
- ☆126Updated 6 years ago
- ☆62Updated 3 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- ☆22Updated 2 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆204Updated last year
- The 802.11 Hacking Repo.☆36Updated 9 years ago
- Take back your privacy. Lose yourself in the haystack.☆565Updated 2 months ago
- 👻 A LAN dropbox chatbot controllable via Telegram☆358Updated 5 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆104Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Tor-based proxy for linux☆66Updated 5 years ago
- WiFi- and Bluetooth devices overlayed on Google Maps. Sourced from WiGLE Android app / Aircrack-ng.☆89Updated 2 years ago