OperatorFoundation / AdversaryLab
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆23Updated 6 months ago
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- This is where we work on the newsletter☆28Updated 7 years ago
- The web site☆14Updated 2 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- ☆39Updated 9 years ago
- OSX Security Compliance & Hardening☆49Updated 9 years ago
- ☆8Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- ☆12Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- New and Improved☆17Updated 9 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- python tor client☆27Updated 9 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ANWI - All New Wireless IDS☆27Updated 6 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- ☆15Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago