usbkill
Shut-down trigger
A tool that detects and responds to unauthorized USB activity by shutting down the computer.
« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
4k stars
208 watching
509 forks
Language: Python
last commit: 9 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
buskill/buskill-app | An app for arming and controlling a laptop kill cord to trigger lockdown or shutdown when the device is physically separated from the user. | 157 |
natebrune/silk-guardian | A kernel module that automatically shuts down and securely wipes the system's files when a USB device is inserted or changed. | 678 |
ufrisk/pcileech | Software for exploiting vulnerabilities in computer systems to gain access to sensitive data and control system operations. | 5,011 |
samyk/poisontap | Exploits a locked computer to install a persistent backdoor and expose internal network resources. | 6,248 |
lordnoteworthy/al-khaser | A Proof-of-Concept malware application designed to test anti-malware and sandbox systems. | 5,919 |
heppu/gkill | An interactive process killer tool for Linux and macOS that allows users to filter and kill processes using keyboard navigation. | 315 |
openwall/john | A password cracking tool that supports multiple hash and cipher types | 10,317 |
google/ukip | A daemon tool for detecting and mitigating unauthorized USB keystroke injection on Linux systems. | 518 |
evilsocket/opensnitch | An interactive application firewall that allows users to filter and manage network connections on GNU/Linux systems. | 10,932 |
hacksysteam/hacksysextremevulnerabledriver | A proof-of-concept Windows and Linux kernel driver intentionally vulnerable to exploitation for research and skill-building purposes. | 2,468 |
starius/logic-bomb | A Linux kernel module that uses keyboard input to trigger system shutdown based on predefined text strings. | 38 |
hackplayers/evil-winrm | A tool providing a custom WinRM interface for post-exploitation purposes in Windows environments | 4,537 |
liamg/traitor | A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,689 |
withsecurelabs/chainsaw | A tool for rapid analysis of Windows forensic artefacts to support incident response and threat hunting investigations. | 2,876 |
rack/rack-attack | Protects web applications from abusive requests by defining rules to block or throttle unwanted traffic | 5,577 |