GDSSecurity / cloud-and-controlLinks
☆26Updated 13 years ago
Alternatives and similar repositories for cloud-and-control
Users that are interested in cloud-and-control are comparing it to the libraries listed below
Sorting:
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- Password analysis software☆37Updated 10 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Collect, watch, and analyze SSL/TLS CRL data☆57Updated 14 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- A simple, but damn fast sinkhole☆65Updated 10 months ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 11 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- stream encoding toolkit☆55Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 11 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Threatbutt Suite☆37Updated 10 years ago
- ☆30Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- ☆18Updated 9 years ago
- ☆53Updated last year
- Crypto scanner☆43Updated 14 years ago