OperatorFoundation / AdversaryLab
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆21Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for AdversaryLab
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- ☆38Updated 8 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆39Updated 4 years ago
- This is where we work on the newsletter☆28Updated 6 years ago
- ☆15Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 7 years ago
- python tor client☆26Updated 9 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- ☆14Updated 4 years ago
- Repository for Tor's DNS-related issues.☆17Updated 7 years ago
- ☆12Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆84Updated 7 years ago
- Command line utility for parsing certificates☆59Updated 3 years ago
- BGP Route Leaks Detection☆70Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- The web site☆15Updated last year
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- A tool (and library) for TACKs☆25Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- Mass DNS resolution tool☆36Updated 3 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated last year
- post-exploitation tools☆15Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month