Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆22Oct 30, 2024Updated last year
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- ☆63May 22, 2014Updated 11 years ago
- Aptivate logframe django project☆11Mar 7, 2019Updated 7 years ago
- An easy to use censorship simulating access point in a box☆27Jul 20, 2017Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- A resource for anyone helping journalists and newsrooms step up their security practices.☆39Aug 16, 2023Updated 2 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- Generate NSA code words☆19Apr 14, 2017Updated 8 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- This repository contains stuff which would be helpful for jailbroken iOS development.☆14Sep 15, 2015Updated 10 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Feb 11, 2026Updated last month
- duraconf - A collection of hardened configuration files for SSL/TLS services☆17Jun 13, 2020Updated 5 years ago
- Cryptolog is a tool for anonymizing webserver logs.☆70Jul 28, 2016Updated 9 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- IRC Integration for LiffyBot (a WIP port of Erlbot)☆15Nov 25, 2016Updated 9 years ago
- Unofficial mirror of plan9-from-bell-labs/u9fs☆11Oct 14, 2021Updated 4 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- This is a repository to track issues and suggestions to the Pluggable Transports spec☆27Jan 8, 2022Updated 4 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Scapy scripts used to research Apple's Call Relay Protocol and find vulnerabilities☆28Nov 13, 2023Updated 2 years ago
- Protean is a collection of transformers designed for the purpose of obfuscating UDP network traffic☆16Dec 4, 2020Updated 5 years ago
- Collection of data about URL filtering in various countries☆44Sep 21, 2016Updated 9 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- simple userspace vpn implementation in python☆15Apr 21, 2013Updated 12 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A WordPress parent theme for interactive maps and journalism☆89Aug 24, 2020Updated 5 years ago
- A httpbin reimplementation in rust☆10Dec 29, 2018Updated 7 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Makes email "scary" to disrupt NSA surveillance☆37Oct 16, 2013Updated 12 years ago
- king of the hill cybersecurity competition☆31May 4, 2022Updated 3 years ago
- A deep packet inspection (DPI) framework for benchmarking the covertness of protocol-obfuscation proxies.☆14Apr 13, 2022Updated 3 years ago
- Spark MLib Training Models for Network Security☆16Mar 19, 2018Updated 8 years ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago