zakqwy / NSA-B-GONE
Thinkpad X220 board that disconnects the webcam and microphone data lines
☆44Updated 6 years ago
Alternatives and similar repositories for NSA-B-GONE:
Users that are interested in NSA-B-GONE are comparing it to the libraries listed below
- ☆34Updated 6 years ago
- CLIP OS toolkit (cosmk)☆16Updated 3 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Small EFI utility that clears the power-on and setup passwords in IBM x3550/x3650 M3 servers☆46Updated 4 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- Airprobe for frequency hopping GSM channels☆28Updated 10 years ago
- Liberté Linux, a live distribution serving as a communication aid in hostile environments.☆81Updated 9 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Magnetic stripe spoofer implementing audio waves.☆38Updated 8 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- A collection of crackmes☆40Updated 3 months ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- An Arduino USB plugin that attempts to guess the host OS☆79Updated 6 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 9 years ago
- Packet-o-matic NG !☆65Updated 8 months ago
- ☆44Updated 2 months ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- USB armory Debian base image☆79Updated 3 weeks ago
- ☆29Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 7 years ago