GDSSecurity / cloud-and-controlLinks
☆26Updated 14 years ago
Alternatives and similar repositories for cloud-and-control
Users that are interested in cloud-and-control are comparing it to the libraries listed below
Sorting:
- stream encoding toolkit☆54Updated 9 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 9 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 11 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Threatbutt Suite☆37Updated 10 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- ☆12Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Blackmamba is a new concurrent networking library for Python. Blackmamba was built from the ground up leveraging the power of epoll and c…☆44Updated 12 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A simple, but damn fast sinkhole☆65Updated 11 months ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- opmsg p2p transport network☆74Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Password analysis software☆37Updated 10 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 11 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 12 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- ☆30Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago