trpt / usbdeath
anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device removal
☆126Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for usbdeath
- Panic button for protection against cold boot attacks☆139Updated 2 years ago
- KeePass 2 database master-password cracker☆128Updated 6 years ago
- SSLStrip version to defeat HSTS☆70Updated last year
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Pastejacking - PasteZort☆84Updated 5 years ago
- new WPS attack tool☆54Updated 9 years ago
- The Pereval server: a set of OSINT & misc related web-services☆35Updated 4 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆90Updated 7 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆64Updated 7 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆243Updated 10 years ago
- Metadata Anonymisation Toolkit☆94Updated 4 years ago
- WiFi Pineapple DIY☆73Updated 7 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆227Updated 3 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak security☆226Updated 5 years ago
- Misc scripts and tools for WiFi☆101Updated 3 years ago
- ☆35Updated 10 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- ☆61Updated 2 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 7 years ago
- 👻 A LAN dropbox chatbot controllable via Telegram☆356Updated 5 years ago
- Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.☆22Updated 7 years ago
- Filet-O-Firewall Vulnerability PoC☆60Updated 9 years ago
- ☆109Updated 2 years ago
- ☆205Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆369Updated last year
- Auto discover and exploit LAN raspberry pi's☆105Updated 7 months ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆162Updated 5 years ago
- ☆121Updated 5 years ago