OperatorFoundation / AdversaryLabLinks
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆22Updated last year
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆43Updated 5 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- The web site☆15Updated 2 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- This is where we work on the newsletter☆28Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 2 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- Repository for Tor's DNS-related issues.☆17Updated 9 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Command line utility for parsing certificates☆67Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Updated 8 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 5 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- ☆16Updated 9 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆157Updated 6 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago