Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆22Oct 30, 2024Updated last year
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- ☆63May 22, 2014Updated 11 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- List of Sanctions and Most wanted☆29Jun 9, 2017Updated 8 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- LevelUp project website☆32Aug 10, 2024Updated last year
- This is a repository to track issues and suggestions to the Pluggable Transports spec☆26Jan 8, 2022Updated 4 years ago
- Cryptolog is a tool for anonymizing webserver logs.☆70Jul 28, 2016Updated 9 years ago
- Framework for static and dynamic analysis in Android APKs☆32Jul 25, 2017Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Feb 11, 2026Updated 2 weeks ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- Keeping track of government in 2017☆33Jan 28, 2017Updated 9 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- Collection of data about URL filtering in various countries☆44Sep 21, 2016Updated 9 years ago
- A resource for anyone helping journalists and newsrooms step up their security practices.☆39Aug 16, 2023Updated 2 years ago
- ☆11Nov 18, 2020Updated 5 years ago
- RandomX, CryptoNight, AstroBWT and Argon2 CPU/GPU miner - macOS Build Only☆11Jun 7, 2020Updated 5 years ago
- Swift client for the LIFX UDP protocol☆10Apr 21, 2019Updated 6 years ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- Mac OSX menulet showing current IP addresses for all network interfaces. Shows address associated with en0 by default and monitors change…☆10May 23, 2020Updated 5 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆10Feb 16, 2023Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- MinIO nodes for n8n☆11Feb 2, 2026Updated 3 weeks ago
- Fork of etckeeper to work with OS X.☆10Mar 10, 2015Updated 10 years ago
- Roadmap for Lantern development☆12Mar 2, 2018Updated 7 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- ☆11Dec 5, 2022Updated 3 years ago