GDSSecurity / cloud-and-control
☆26Updated 13 years ago
Alternatives and similar repositories for cloud-and-control:
Users that are interested in cloud-and-control are comparing it to the libraries listed below
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆18Updated 8 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Threatbutt Suite☆37Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- A simple, but damn fast sinkhole☆64Updated 4 months ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 10 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 9 years ago
- ☆30Updated 10 years ago
- A wrapper for dd☆20Updated 8 years ago
- ☆12Updated 8 years ago
- ☆53Updated 7 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 4 months ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 10 years ago
- lte security☆41Updated 9 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago