GDSSecurity / cloud-and-controlLinks
☆26Updated 13 years ago
Alternatives and similar repositories for cloud-and-control
Users that are interested in cloud-and-control are comparing it to the libraries listed below
Sorting:
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Password analysis software☆37Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- ☆18Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆65Updated 13 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- Threatbutt Suite☆37Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 10 years ago
- Blackmamba is a new concurrent networking library for Python. Blackmamba was built from the ground up leveraging the power of epoll and c…☆43Updated 11 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 10 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- ☆30Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago
- Parser for zebra/MRT BGP routes dumps.☆40Updated 8 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Updated 10 years ago
- Collect, watch, and analyze SSL/TLS CRL data☆57Updated 14 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago