Repo for the paper "USB Devices phoning home"
☆22Feb 12, 2016Updated 10 years ago
Alternatives and similar repositories for usbpoc
Users that are interested in usbpoc are comparing it to the libraries listed below
Sorting:
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆44Mar 1, 2018Updated 8 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- Scripts, learnings, sample configurations, and random whining☆151May 19, 2015Updated 10 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- ☆168Apr 2, 2017Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28May 22, 2016Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- stm32f4xx GCC Barebones Project☆38Oct 11, 2015Updated 10 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆10Apr 10, 2021Updated 4 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Maltego Transforms to Query Traffic Records☆34Oct 13, 2015Updated 10 years ago
- ☆11Jul 10, 2024Updated last year
- Create a screenshot of a remote desktop because NLA is disabled.☆39Oct 30, 2021Updated 4 years ago
- lte security☆42Nov 17, 2015Updated 10 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Apr 28, 2023Updated 2 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- Password manager for USB Armory☆37Sep 1, 2015Updated 10 years ago
- xhyve, a lightweight OS X virtualization solution☆12May 14, 2018Updated 7 years ago
- Source of Feitian OpenSK USB Dongle help docs.☆12Jul 5, 2022Updated 3 years ago