amap0la's Stars
kaneton/kaneton
kaneton is an educational microkernel that has been used for teaching purposes for over 8 years.
certsocietegenerale/fame
FAME Automates Malware Evaluation
enigma0x3/Generate-Macro
This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.
szcom/rnnlib
RNNLIB is a recurrent neural network library for sequence learning problems. Forked from Alex Graves work http://sourceforge.net/projects/rnnl/
nsarno/nm-objdump
A personal nm and objdump implementation
aluzzardi/pam_usb
Hardware authentication for Linux using ordinary USB Flash Drives.
Parrot-Developers/ledd-ng
Ledd is a daemon responsible of controlling the leds of a product.
daveti/badusb
Bad USB collections with malicious firmware
libusb/libusb
A cross-platform library to access USB devices
git/git
Git Source Code Mirror - This is a publish-only repository but pull requests can be turned into patches to the mailing list via GitGitGadget (https://gitgitgadget.github.io/). Please follow Documentation/SubmittingPatches procedure for any of your improvements.
vim/vim
The official Vim repository
LACSC/USBWall
kernel-based security module for USB mass-storage device filtering
samyk/keysweeper
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity.
samyk/usbdriveby
USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoor, and rerouting DNS within seconds of plugging it in.
samyk/pwnat
The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofing.
sleuthkit/sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
ossec/ossec-hids
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
torvalds/linux
Linux kernel source tree
gamelinux/passivedns
A network sniffer that logs all DNS server replies for use in a passive DNS setup