GDSSecurity / cloud-and-controlLinks
☆26Updated 13 years ago
Alternatives and similar repositories for cloud-and-control
Users that are interested in cloud-and-control are comparing it to the libraries listed below
Sorting:
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Password analysis software☆37Updated 10 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 11 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- Threatbutt Suite☆37Updated 10 years ago
- Various tools related to SSL denial of service☆46Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Tools to interact with a certificate transparency server☆23Updated 9 years ago
- Collect, watch, and analyze SSL/TLS CRL data☆57Updated 14 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Quantum Insert/FoxAcid case study☆15Updated 8 years ago
- stream encoding toolkit☆55Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A simple, but damn fast sinkhole☆64Updated 8 months ago
- Bruteforce attack blocker (ssh, FTP, SMTP, and more)☆64Updated 4 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 6 years ago
- Blackmamba is a new concurrent networking library for Python. Blackmamba was built from the ground up leveraging the power of epoll and c…☆43Updated 11 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- ☆12Updated 8 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago