usbdeath Logo

usbdeath

0
Free
Visit Website

usbdeath is a small script inspired by usbkill, 'an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer'. The main differences are: - It is written in bash, making it easily auditable by individuals with basic programming skills. - It is not a daemon but a rule file manipulation script, with all monitoring handled by the existing udev daemon. - It utilizes more identification values for USB devices, such as name and serial number. Config: You should modify options within the script, turning off safe (demo) mode and editing trigger commands (default are sync and poweroff). Usage: usbdeath action where action is: - o, on: activate usbdeath - x, off: temporarily deactivate usbdeath - j, eject: add entry on eject event - g, gen: generate or refresh whitelist udev rules file - d, del: delete udev rules file - t, trigger: trigger event on insertion or removal - e, edit: edit udev rules file manually - s, show: show current

FEATURES

ALTERNATIVES

iOSForensic is a Python tool for forensic analysis on iOS devices, extracting files, logs, SQLite3 databases, and .plist files into XML.

An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.

Automated Mac Forensic Triage Collector

Truehunter is a tool designed to detect encrypted containers with a focus on Truecrypt and Veracrypt, utilizing a fast and memory efficient approach.

A powerful tool for analyzing and visualizing system activity timelines.

A software utility with forensic tools for smartphones, offering powerful data extraction and decoding capabilities.

A tool for discovering, analyzing, and remedying sensitive data

A forensic research tool for gathering forensic traces on Android and iOS devices, supporting the use of public indicators of compromise.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security