OperatorFoundation / AdversaryLabLinks
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆23Updated 7 months ago
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- This is where we work on the newsletter☆28Updated 7 years ago
- End-to-End encrypted Tor2Web gateway☆37Updated 4 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Command line utility for parsing certificates☆64Updated 4 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 9 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- python tor client☆27Updated 9 years ago
- The web site☆14Updated 2 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ☆8Updated 4 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- ☆18Updated 2 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆40Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ☆15Updated 8 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Web of trust grapher☆38Updated 2 weeks ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago