OperatorFoundation / AdversaryLabLinks
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆22Updated 11 months ago
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- The web site☆14Updated 2 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Command line utility for parsing certificates☆65Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 8 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- suspect is a simple bash triage tool☆18Updated 7 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆41Updated 5 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- ☆16Updated 9 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆14Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆30Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆78Updated 7 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago