zelon88 / Workstation_USB_MonitorLinks
Know whenever a domain user plugs in a USB storage device. Log & email when storage devices get attached to your network.
☆15Updated 6 years ago
Alternatives and similar repositories for Workstation_USB_Monitor
Users that are interested in Workstation_USB_Monitor are comparing it to the libraries listed below
Sorting:
- Reddit datahoarding toolkit☆21Updated 7 years ago
- A short script for setting up a Wireguard VPN and an Unbound DNS server☆39Updated 4 years ago
- ☆97Updated 7 years ago
- Builds various virtual environments☆61Updated 4 years ago
- Web on top of any protocol☆113Updated 5 years ago
- A self-hosted drag-and-drop, nosql yet fully-featured file-scanning server.☆30Updated 3 years ago
- A more isolated virtualenv☆28Updated 6 years ago
- A Linux shell script to improve your privacy online☆85Updated 9 years ago
- What if you could use bash from a filesystem?☆64Updated 6 years ago
- igloo 4.4☆121Updated 4 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 5 years ago
- Send endless amounts of ssh banner to ssh bots☆78Updated 6 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Discover SPOF in DNS dependency graphs☆66Updated 7 years ago
- nixarmor is a linux hardening automation project☆64Updated 3 years ago
- A Windows script to monitor registry hives for modifications & notify you when modifications have occured.☆23Updated 5 years ago
- Standalone SSH server for Windows☆224Updated 2 years ago
- Hearts drawn with Python Matplotlib and C☆42Updated 6 years ago
- minimal file sharing site - self hosted☆155Updated 5 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- Mentally computable verification codes for email aliases implemented as a postfix tcp table; uses asyncio.☆42Updated 10 months ago
- DNS proxy for filtering out unwanted domains☆67Updated 3 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- Jaxcore speech synthesis library☆47Updated 3 years ago
- How to "encourage" your children to use the internet more for learning using Pi-hole 5.0☆66Updated 5 years ago
- ☆30Updated 6 years ago
- End-to-end encrypted notes application☆122Updated 3 years ago
- file history with ed(1), diff(1), awk(1), sed(1) and sh(1)☆108Updated 5 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆108Updated 11 months ago
- DNS based ad blocker with DNS over HTTPS support.☆24Updated 5 years ago