GDSSecurity / cloud-and-controlLinks
☆26Updated 14 years ago
Alternatives and similar repositories for cloud-and-control
Users that are interested in cloud-and-control are comparing it to the libraries listed below
Sorting:
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- A simple, but damn fast sinkhole☆65Updated last month
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 12 years ago
- Password analysis software☆37Updated 10 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆64Updated 8 years ago
- ☆24Updated 4 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- ☆30Updated 10 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Source IP spoofing for anonymization over UDP☆24Updated 8 years ago
- stream encoding toolkit☆54Updated 10 years ago
- ☆12Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Updated 11 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 11 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆159Updated 6 years ago
- unhash is a set of tools designed to enable better password auditing☆120Updated 3 years ago