Kernel module used by Douane firewall
☆23Jun 14, 2018Updated 7 years ago
Alternatives and similar repositories for douane-dkms
Users that are interested in douane-dkms are comparing it to the libraries listed below
Sorting:
- Daemon process for the Douane firewall☆19Aug 28, 2018Updated 7 years ago
- A modern GNU/Linux firewall for GNOME☆387Jun 14, 2018Updated 7 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- ☆31Feb 24, 2014Updated 12 years ago
- IRMA ansible☆24Nov 28, 2016Updated 9 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- Subgraph Application Firewall☆105Nov 16, 2018Updated 7 years ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- Extract files from captured TCP sessions. Support live streams and pcap files.☆49Feb 14, 2013Updated 13 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Implement MTCNN with Tensorflow.js. A face detection framework with MTCNN and Tensorflow.js☆11Jun 30, 2022Updated 3 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Flatpak builds for Signal, from source☆16Feb 21, 2026Updated last week
- ☆10Aug 26, 2016Updated 9 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 5 years ago
- Legacy version of libewf☆13Dec 20, 2025Updated 2 months ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- Production-ready Chainlit RAG application with Pinecone pipeline offering all Groq and OpenAI Models, to chat with your documents.☆11Aug 19, 2025Updated 6 months ago
- GPG Encrypts an IMAP folder☆12May 4, 2020Updated 5 years ago
- Assorted scripts for Bro☆12Feb 8, 2016Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- ☆10Jan 29, 2025Updated last year
- ☆14Sep 15, 2016Updated 9 years ago
- Simple docker lita bot container☆10Jun 25, 2015Updated 10 years ago
- Pixano website☆10Apr 7, 2022Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Single-Page Apps and HTML5 pushState☆13Jun 4, 2023Updated 2 years ago
- Facts for devices in lspci☆10Apr 29, 2015Updated 10 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago