uber-archive / usb2facLinks
Enabling 2fac confirmation for newly connected USB devices
☆45Updated 9 years ago
Alternatives and similar repositories for usb2fac
Users that are interested in usb2fac are comparing it to the libraries listed below
Sorting:
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 10 years ago
- YAPDNS☆39Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- A Network Inspection Tool☆82Updated 7 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- r2yara - Module for Yara using radare2 information☆36Updated last year
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- NTP logger/honeypot☆54Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Utility to decompress Linux swsusp hibernation file.☆29Updated 4 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago