OperatorFoundation / AdversaryLabLinks
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆23Updated 8 months ago
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 7 years ago
- Command-line utility to control Tor.☆89Updated last year
- Automated OpenSSH hardening☆43Updated 8 years ago
- python tor client☆27Updated 9 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆44Updated 6 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 10 years ago
- The web site☆14Updated 2 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Command line utility for parsing certificates☆64Updated 4 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 9 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆40Updated 4 years ago
- A tool (and library) for TACKs☆29Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆78Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- TLS - what can go wrong?☆108Updated 6 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- trustor (PoC)☆25Updated 3 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆13Updated 8 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆136Updated 2 years ago