usbarmory / armory-drive
Armory Drive - USB encrypted drive with mobile unlock over BLE
☆53Updated last week
Alternatives and similar repositories for armory-drive:
Users that are interested in armory-drive are comparing it to the libraries listed below
- Checks for tpm vulnerabilities☆36Updated last year
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- USB armory - Mass Storage firmware☆24Updated 3 weeks ago
- A tool to help you understand TPM commands and responses.☆37Updated 2 months ago
- The bare metal Go smart card☆184Updated last week
- A USB armory based USB sandbox☆20Updated 7 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- ☆20Updated 3 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆22Updated 2 years ago
- USB armory - hardware control tool☆29Updated last week
- ☆22Updated 6 years ago
- Go Trusted Execution Environment (TEE)☆116Updated this week
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆61Updated 3 years ago
- ☆21Updated this week
- Converged Security Suite for Intel & AMD platform security features☆60Updated last week
- Determine Who Can Log In to an SSH Server☆29Updated 2 years ago
- Verify and assert policy on YubiKey attestation certificates☆20Updated this week
- Static code analysis of refpolicy style SELinux policy☆42Updated 2 weeks ago
- ☆25Updated last year
- E4's C2 server☆19Updated 4 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 2 years ago
- egrets monitors egress☆46Updated 4 years ago
- Fuzz Network Traffic☆18Updated last month
- A framework for parsing binary data.☆16Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago