Repo for the paper "USB Devices phoning home"
☆22Feb 12, 2016Updated 10 years ago
Alternatives and similar repositories for usbpoc
Users that are interested in usbpoc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hid emulation tools for the usbarmory☆68Dec 12, 2016Updated 9 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scripts, learnings, sample configurations, and random whining☆151May 19, 2015Updated 10 years ago
- The BornHack 2017 Badge☆10Aug 4, 2018Updated 7 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆44Mar 1, 2018Updated 8 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- ☆31May 2, 2020Updated 5 years ago
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- An experiment in fingerprint-free encrypted messaging☆33Jun 1, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- a rebuild of marionette, encrypted programmable traffic obfuscation proxy☆12Nov 29, 2023Updated 2 years ago
- PS scripts for checking your certificate store, and code-signing status of executables.☆17Nov 25, 2015Updated 10 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Select and record a portion of your desktop☆10Jul 6, 2022Updated 3 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- OCaml-bitcoin is a library offering an OCaml interface to the official Bitcoin client API☆24Nov 29, 2023Updated 2 years ago
- A python GTK implementation of textsecure.☆18Jun 30, 2014Updated 11 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆20Jan 15, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Sensything is an ESP32-based IoT device that has multiple sensor interfaces to read from and send data from both analog and digital senso…☆20Mar 4, 2019Updated 7 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Oct 15, 2020Updated 5 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Coreboot Builder☆16Jun 1, 2017Updated 8 years ago
- ☆168Apr 2, 2017Updated 9 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Mar 17, 2017Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple network sandbox for Unix and Windows☆20Jan 28, 2019Updated 7 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- Password manager for USB Armory☆37Sep 1, 2015Updated 10 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago