Detect physical tampering and evil maid attacks on your machine
-
Updated
Mar 15, 2024 - Shell
Detect physical tampering and evil maid attacks on your machine
Raspberry Pi-based covert network implant for physical red team engagements. Transparent L2 bridging, 802.1X bypass, identity spoofing, and out-of-band 4G/LTE control
Add a description, image, and links to the physical-security topic page so that developers can more easily learn about it.
To associate your repository with the physical-security topic, visit your repo's landing page and select "manage topics."