OperatorFoundation / AdversaryLabLinks
Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules can be synthesized to block sampled traffic. The purpose of this service is to help application developers create applications which are more resistant to network filtering attacks.
☆22Updated 10 months ago
Alternatives and similar repositories for AdversaryLab
Users that are interested in AdversaryLab are comparing it to the libraries listed below
Sorting:
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- The web site☆14Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆41Updated 5 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- Command line utility for parsing certificates☆65Updated 4 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- python tor client☆27Updated 10 years ago
- Command-line utility to control Tor.☆89Updated last year
- suspect is a simple bash triage tool☆18Updated 7 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Rogue AP killer☆90Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- ☆15Updated 5 years ago