OperatorFoundation / AdversaryLabLinks
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆22Updated last year
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆42Updated 5 years ago
- The web site☆15Updated 2 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- Command line utility for parsing certificates☆66Updated 4 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆58Updated 8 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Updated 8 years ago
- Command-line utility to control Tor.☆89Updated 2 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Backup scripts I use on my drives.☆25Updated 8 years ago
- python tor client☆27Updated 10 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago