Repo for the paper "USB Devices phoning home"
☆22Feb 12, 2016Updated 10 years ago
Alternatives and similar repositories for usbpoc
Users that are interested in usbpoc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hid emulation tools for the usbarmory☆68Dec 12, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆41Sep 6, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Scripts, learnings, sample configurations, and random whining☆151May 19, 2015Updated 11 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆44Mar 1, 2018Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- ☆31May 2, 2020Updated 6 years ago
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- Demo: OS sandboxing for unsafe code in Rust☆13Mar 10, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- a rebuild of marionette, encrypted programmable traffic obfuscation proxy☆12Nov 29, 2023Updated 2 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- PS scripts for checking your certificate store, and code-signing status of executables.☆17Nov 25, 2015Updated 10 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Select and record a portion of your desktop☆10Jul 6, 2022Updated 3 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Jan 15, 2017Updated 9 years ago
- A python GTK implementation of textsecure.☆18Jun 30, 2014Updated 11 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Oct 15, 2020Updated 5 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Coreboot Builder☆16Jun 1, 2017Updated 8 years ago
- ☆170Apr 2, 2017Updated 9 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆14Mar 17, 2017Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Simple network sandbox for Unix and Windows☆20Jan 28, 2019Updated 7 years ago
- Clone of hidden tear written in C++☆71Oct 18, 2020Updated 5 years ago
- Fully sync two secure-scuttlebutt databases over a duplex stream.☆15Jun 13, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Experiemental userspace eBPF library☆15Aug 10, 2015Updated 10 years ago
- Application-level firewalling using systemd socket action and eBPF filters☆18Oct 11, 2017Updated 8 years ago
- register with termux-api your wifi-stick on your android☆11Dec 18, 2022Updated 3 years ago
- INTERLOCK - file encryption and HSM front-end☆306Feb 2, 2026Updated 3 months ago
- A project that implements statistical methods for identifying anomalous files☆22Dec 10, 2014Updated 11 years ago
- A new append-only-log for SSB purposes☆16Mar 15, 2023Updated 3 years ago