panic_bcast Logo

panic_bcast

0
Free
Visit Website

panic_bcast is a network protocol panic button operating decentralized through UDP broadcasts and HTTP. It’s intended to act a panic button in a sensitive network making it harder to perform cold boot attacks. A serious freedom fighter will run something like this on all nodes in the computerized network. panic_bcast was written with the intention to support any form of UNIX that can run Python. It has been successfully tested on FreeBSD and Linux. To trigger the panic signal over HTTP simply request http://...:8080/panic from a machine that is running panic_bcast. Which ever will do. How it works An activist has uninvited guests at the door The activist sends the panic signal, a UDP broadcast, with panic_bcast Other machines in the network pick up the panic signal Once panic_bcast has picked the panic signal it kills truecrypt and powers off the machine. Authentication If you want you can append the panic signal with a required key. Just execute the script with the -k option. When using the key it is appended to the string "panic"; if your key happens to be "_banana" then the panic signal will respectively be "panic_banana". The panic signal is then sent over the network.

FEATURES

ALTERNATIVES

A tool to discover new target domains using Content Security Policy

A command line tool for running SQL queries on PCAP files with various output options and a simplistic web-server.

A subdomain scan tool that helps you find subdomains of a given domain.

Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.

Contains various use cases of Kubernetes Network Policies and sample YAML files.

A module for loading Bro logs as tables in Osquery

A powerful interactive packet manipulation program and library for network exploration and security testing.

A simple command-line tool that scans a website for CORS misconfigurations

PINNED