GDSSecurity / cloud-and-control
☆26Updated 13 years ago
Alternatives and similar repositories for cloud-and-control:
Users that are interested in cloud-and-control are comparing it to the libraries listed below
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- ☆18Updated 8 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- ☆30Updated 9 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆102Updated 4 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆25Updated 13 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Password analysis software☆37Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- passive downloading☆13Updated 9 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- QuickDefence - Web Application Firewall [ NOT MAINTAINED]☆80Updated 3 years ago
- ipcrypt implementation in C☆31Updated 4 years ago
- A simple, but damn fast sinkhole☆64Updated 3 months ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆10Updated 9 years ago
- Threatbutt Suite☆37Updated 9 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 10 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago